Permanently disable xss auditor.

Minimal code change to get new behaviour so that tests can
be updated. Code cleanup in a subsequent CL.

The third_party/blink/web_tests/http/tests/security/xssAuditor
directory is removed entirely. Three other files outside this
directory are removed which also triggered the auditor.

Bug: 968591
Change-Id: I6374a4c381c8a5210eaff97c8f031a789c7059b7
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1723805
Commit-Queue: Tom Sepez <tsepez@chromium.org>
Reviewed-by: Nico Weber <thakis@chromium.org>
Reviewed-by: Mike West <mkwst@chromium.org>
Cr-Commit-Position: refs/heads/master@{#684138}
diff --git a/third_party/blink/renderer/core/html/parser/xss_auditor.cc b/third_party/blink/renderer/core/html/parser/xss_auditor.cc
index 3f8e39e..23725ef 100644
--- a/third_party/blink/renderer/core/html/parser/xss_auditor.cc
+++ b/third_party/blink/renderer/core/html/parser/xss_auditor.cc
@@ -363,105 +363,15 @@
 
 void XSSAuditor::Init(Document* document,
                       XSSAuditorDelegate* auditor_delegate) {
+  // XSSAuditor permanently disabled.
+  // TODO(968591): remove this code after modifying callers.
   TRACE_EVENT0("loading", "XSSAuditor::Init");
   DCHECK(IsMainThread());
   if (state_ != kUninitialized)
     return;
+
   state_ = kFilteringTokens;
-
-  if (Settings* settings = document->GetSettings())
-    is_enabled_ = settings->GetXSSAuditorEnabled();
-
-  if (!is_enabled_)
-    return;
-
-  document_url_ = document->Url();
-  document_url_.RemoveFragmentIdentifier();
-  document_url_ = document_url_.Copy();  // Make thread safe.
-
-  // In theory, the Document could have detached from the LocalFrame after the
-  // XSSAuditor was constructed.
-  if (!document->GetFrame()) {
-    is_enabled_ = false;
-    return;
-  }
-
-  if (document_url_.IsEmpty()) {
-    // The URL can be empty when opening a new browser window or calling
-    // window.open("").
-    is_enabled_ = false;
-    return;
-  }
-
-  if (document_url_.ProtocolIsData()) {
-    is_enabled_ = false;
-    return;
-  }
-
-  if (document->Encoding().IsValid())
-    encoding_ = document->Encoding();
-
-  if (DocumentLoader* document_loader =
-          document->GetFrame()->Loader().GetDocumentLoader()) {
-    const AtomicString& header_value =
-        document_loader->GetResponse().HttpHeaderField(
-            http_names::kXXSSProtection);
-    String error_details;
-    unsigned error_position = 0;
-    String report_url;
-    KURL xss_protection_report_url;
-
-    ReflectedXSSDisposition xss_protection_header = ParseXSSProtectionHeader(
-        header_value, error_details, error_position, report_url);
-
-    if (xss_protection_header == kAllowReflectedXSS)
-      UseCounter::Count(*document, WebFeature::kXSSAuditorDisabled);
-    else if (xss_protection_header == kFilterReflectedXSS)
-      UseCounter::Count(*document, WebFeature::kXSSAuditorEnabledFilter);
-    else if (xss_protection_header == kBlockReflectedXSS)
-      UseCounter::Count(*document, WebFeature::kXSSAuditorEnabledBlock);
-    else if (xss_protection_header == kReflectedXSSInvalid)
-      UseCounter::Count(*document, WebFeature::kXSSAuditorInvalid);
-
-    did_send_valid_xss_protection_header_ =
-        xss_protection_header != kReflectedXSSUnset &&
-        xss_protection_header != kReflectedXSSInvalid;
-    if ((xss_protection_header == kFilterReflectedXSS ||
-         xss_protection_header == kBlockReflectedXSS) &&
-        !report_url.IsEmpty()) {
-      xss_protection_report_url = document->CompleteURL(report_url);
-      if (MixedContentChecker::IsMixedContent(document->GetSecurityOrigin(),
-                                              xss_protection_report_url)) {
-        error_details = "insecure reporting URL for secure page";
-        xss_protection_header = kReflectedXSSInvalid;
-        xss_protection_report_url = KURL();
-      }
-    }
-    if (xss_protection_header == kReflectedXSSInvalid) {
-      document->AddConsoleMessage(ConsoleMessage::Create(
-          mojom::ConsoleMessageSource::kSecurity,
-          mojom::ConsoleMessageLevel::kError,
-          "Error parsing header X-XSS-Protection: " + header_value + ": " +
-              error_details + " at character position " +
-              String::Format("%u", error_position) +
-              ". The default protections will be applied."));
-    }
-
-    xss_protection_ = xss_protection_header;
-    if (xss_protection_ == kReflectedXSSInvalid ||
-        xss_protection_ == kReflectedXSSUnset) {
-      xss_protection_ = kFilterReflectedXSS;
-    }
-
-    if (auditor_delegate)
-      auditor_delegate->SetReportURL(xss_protection_report_url.Copy());
-
-    EncodedFormData* http_body = document_loader->HttpBody();
-    if (http_body && !http_body->IsEmpty())
-      http_body_as_string_ = http_body->FlattenToString();
-  }
-
-  SetEncoding(encoding_);
+  is_enabled_ = false;
 }
 
 void XSSAuditor::SetEncoding(const WTF::TextEncoding& encoding) {
diff --git a/third_party/blink/web_tests/TestExpectations b/third_party/blink/web_tests/TestExpectations
index ebc0169..c3cf8553 100644
--- a/third_party/blink/web_tests/TestExpectations
+++ b/third_party/blink/web_tests/TestExpectations
@@ -2677,12 +2677,8 @@
 crbug.com/528062 [ Win ] http/tests/local/blob/send-hybrid-blob.html [ Failure Timeout ]
 crbug.com/528062 [ Win ] http/tests/security/XFrameOptions/x-frame-options-cached.html [ Failure ]
 crbug.com/528062 [ Win ] http/tests/security/contentSecurityPolicy/cached-frame-csp.html [ Failure ]
-crbug.com/528062 [ Win ] http/tests/security/xssAuditor/cached-frame.html [ Failure ]
-crbug.com/528062 [ Win ] http/tests/security/xssAuditor/chunked-big-script.html [ Failure ]
 crbug.com/528062 [ Win ] virtual/blink-cors/http/tests/security/XFrameOptions/x-frame-options-cached.html [ Failure ]
 crbug.com/528062 [ Win ] virtual/blink-cors/http/tests/security/contentSecurityPolicy/cached-frame-csp.html [ Failure ]
-crbug.com/528062 [ Win ] virtual/blink-cors/http/tests/security/xssAuditor/cached-frame.html [ Failure ]
-crbug.com/528062 [ Win ] virtual/blink-cors/http/tests/security/xssAuditor/chunked-big-script.html [ Failure ]
 
 # When drawing subpixel smoothed glyphs, CoreGraphics will fake bold the glyphs.
 # In this configuration, the pixel smoothed glyphs will be created from subpixel smoothed glyphs.
diff --git a/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit-expected.txt b/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit-expected.txt
deleted file mode 100644
index b31ab04..0000000
--- a/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-This tests that no assertions are thrown when POST submitting a form.
-PASS successfullyParsed is true
-
-TEST COMPLETE
-
-PASS No assertions raised.
diff --git a/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit.html b/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit.html
deleted file mode 100644
index be87fd8..0000000
--- a/third_party/blink/web_tests/fast/forms/xss-auditor-doesnt-crash-on-post-submit.html
+++ /dev/null
@@ -1,32 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script src="../../resources/js-test.js"></script>
-    <script>
-    function test() {
-        if (document.location.hash !== '#submitted') {
-            if (window.testRunner) {
-                testRunner.dumpAsText();
-                testRunner.setXSSAuditorEnabled(true)
-                testRunner.waitUntilDone();
-            }
-
-            var form = document.getElementById('form');
-            // Shouldn't trigger any assertions.
-            form.submit();
-        } else {
-            testPassed('No assertions raised.');
-            if (window.testRunner)
-                testRunner.notifyDone();
-        }
-    }
-    </script>
-</head>
-<body onload="test()">
-    This tests that no assertions are thrown when POST submitting a form.
-    <form method="post" id="form" action="#submitted">
-        <input type="text">
-    </form>
-    <div id="console"></div>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls-expected.txt b/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls-expected.txt
deleted file mode 100644
index a4723a9..0000000
--- a/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==%27%3E' because its source code was found within the request. The auditor was enabled as the server did not send an 'X-XSS-Protection' header.
-
diff --git a/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls.html b/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls.html
deleted file mode 100644
index b757408..0000000
--- a/third_party/blink/web_tests/fast/frames/xss-auditor-handles-file-urls.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="resources/static-xss-vector.html?q=XSS<iframe src='data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=='>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/contentSecurityPolicy/resources/reflected-xss-and-xss-protection.js b/third_party/blink/web_tests/http/tests/security/contentSecurityPolicy/resources/reflected-xss-and-xss-protection.js
deleted file mode 100644
index fb09d2a..0000000
--- a/third_party/blink/web_tests/http/tests/security/contentSecurityPolicy/resources/reflected-xss-and-xss-protection.js
+++ /dev/null
@@ -1,41 +0,0 @@
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.waitUntilDone();
-}
-
-function testMixedHeader(csp, xssProtection) {
-    var params = [
-        'q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<' + '/script>'
-    ];
-    if (csp != 'unset')
-        params.push('csp='+csp);
-
-    if (xssProtection == 'allow')
-        params.push('disable-protection=1');
-    if (xssProtection == 'block')
-        params.push('enable-full-block=1');
-    if (xssProtection == 'filter')
-        params.push('valid-header=2');
-    if (xssProtection == 'invalid')
-        params.push('malformed-header=1');
-
-    var url = '/security/xssAuditor/resources/echo-intertag.pl?';
-    url += params.join('&amp;');
-
-    document.write('<p>Testing behavior when "reflected-xss" is set to ' + csp + ', and "X-XSS-Protection" is set to ' + xssProtection + '.');
-    document.write('<iframe src="' + url + '"></iframe>');
-}
-
-function frameLoaded() {
-    var frame = document.querySelector('iframe');
-    try {
-      alert('Loaded ' + frame.contentWindow.location.href + ' into the IFrame.');
-    } catch (e) {
-      alert('Loaded cross-origin frame.');
-    }
-    testRunner.notifyDone();
-}
-
-window.onload = frameLoaded;
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2-expected.txt
deleted file mode 100644
index 8b13789..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2.html
deleted file mode 100644
index 7155fd97..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/anchor-url-dom-write-location2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-dom-write-unescaped-location.php?#<script>alert('XS%41S')</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char-expected.txt
deleted file mode 100644
index 486d8ad..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=%3Cbase%20href=%27http://127.0.0.1:8000/sec%01urity/xssAuditor/resources/base-href/%27%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char.html
deleted file mode 100644
index 39eb74a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-control-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=<base href='http://127.0.0.1:8000/sec%01urity/xssAuditor/resources/base-href/'>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct-expected.txt
deleted file mode 100644
index bbd18ad..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: /XSS/
-We allow direct injections into base tags to reduce false positives.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct.html
deleted file mode 100644
index e76a788..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-direct.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>We allow direct injections into base tags to reduce false positives.</p>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href-direct.pl?q=http://127.0.0.1:8000/security/xssAuditor/resources/base-href/">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-expected.txt
deleted file mode 100644
index b42dcd6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=%3Cbase%20href=%27http://127.0.0.1:8000/security/xssAuditor/resources/base-href/%27%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char-expected.txt
deleted file mode 100644
index b9f4235..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=%3Cbase%20href=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/base-href/%27%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char.html
deleted file mode 100644
index 4685b9a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=<base href='http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/base-href/'>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe.html
deleted file mode 100644
index 2cb75d0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-<base href='http://127.0.0.1:8000/security/xssAuditor/resources/'>
-</head>
-<body>
-<script src="safe-script.js"></script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2.html
deleted file mode 100644
index 2495b6a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/base-href/base-href-safe2.html">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3.html
deleted file mode 100644
index ab58233b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-safe3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/base-href/base-href-safe3.html">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative-expected.txt
deleted file mode 100644
index 1468c7e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=%3Cbase%20href=%27//127.0.0.1:8000/security/xssAuditor/resources/base-href/%27%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative.html
deleted file mode 100644
index 8c67021..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-scheme-relative.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=<base href='//127.0.0.1:8000/security/xssAuditor/resources/base-href/'>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated-expected.txt
deleted file mode 100644
index f66b42d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=%3Cbase%20href=http://127.0.0.1:8000/security/xssAuditor/resources/base-href/' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated.html
deleted file mode 100644
index 0f78268..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href-unterminated.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=<base href=http://127.0.0.1:8000/security/xssAuditor/resources/base-href/">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href.html
deleted file mode 100644
index 0b359e3c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/base-href.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-head-base-href.pl?q=<base href='http://127.0.0.1:8000/security/xssAuditor/resources/base-href/'>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location-expected.txt
deleted file mode 100644
index 4ea767d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location-expected.txt
+++ /dev/null
@@ -1,8 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53));%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-PASS xssed.contentDocument is null
-PASS xssed.contentWindow.location.href threw exception SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a cross-origin frame..
-PASS successfullyParsed is true
-
-TEST COMPLETE
-
- 
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location.html
deleted file mode 100644
index d5d5565..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-location.html
+++ /dev/null
@@ -1,31 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script src="/js-test-resources/js-test.js"></script>
-    <script>
-        if (window.testRunner)
-            testRunner.setXSSAuditorEnabled(true);
-
-        window.jsTestIsAsync = true;
-
-        function checkFrames() {
-            shouldBeNull('xssed.contentDocument');
-            shouldThrow('xssed.contentWindow.location.href');
-            finishJSTest();
-        }
-
-        var xssed;
-        var crossorigin;
-        window.onload = function () {
-            xssed = document.getElementById('xssed');
-            crossorigin = document.getElementById('crossorigin');
-            xssed.onload = checkFrames;
-            xssed.src = 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53));<' + '/script>';
-        };
-    </script>
-</head>
-<body>
-    <iframe id='xssed'></iframe>
-    <iframe id='crossorigin' src='http://localhost:8000/security/resources/innocent-victim.html'></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt
deleted file mode 100644
index 0b3ed8b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-PASS frame.contentDocument is null
-PASS successfullyParsed is true
-
-TEST COMPLETE
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html
deleted file mode 100644
index 5f59da75..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html
+++ /dev/null
@@ -1,26 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script src="/js-test-resources/js-test.js"></script>
-    <script>
-        if (window.testRunner)
-            testRunner.setXSSAuditorEnabled(true);
-        window.jsTestIsAsync = true;
-
-        function checkReferer() {
-            window.frame = document.querySelector('iframe');
-            shouldBeNull('frame.contentDocument');
-            finishJSTest();
-        }
-
-        window.onload = function () {
-            var i = document.querySelector('iframe');
-            i.onload = checkReferer;
-            i.src = 'http://localhost:8000/security/xssAuditor/resources/redir.php?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1%26q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<' + '/script>';
-        };
-    </script>
-</head>
-<body>
-    <iframe></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame-expected.txt
deleted file mode 100644
index 7308fa8e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame-expected.txt
+++ /dev/null
@@ -1,14 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/nph-cached.pl?q=%3cscript%3ealert(/XSS/);%3c/script%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/nph-cached.pl?q=%3cscript%3ealert(/XSS/);%3c/script%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Check that an X-XSS-Protection header added by a 304 response does not override one from the original request.
-
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-
-Two console messages should be generated, noting that JavaScript was blocked.
-Check that the nonce is the same, meaning that the document was only generated once:
-PASS frame1.contentDocument.querySelector("input").value == frame2.contentDocument.querySelector("input").value is true
-PASS successfullyParsed is true
-
-TEST COMPLETE
-
- 
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame.html
deleted file mode 100644
index 7636d6c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/cached-frame.html
+++ /dev/null
@@ -1,35 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script src="/js-test-resources/js-test.js"></script>
-    <script>
-        if (window.testRunner)
-            testRunner.setXSSAuditorEnabled(true);
-
-        description('Check that an X-XSS-Protection header added by a 304 response does not override one from the original request.');
-        debug('Two console messages should be generated, noting that JavaScript was blocked.');
-        window.jsTestIsAsync = true;
-
-        var frame1, frame2;
-        function frameLoaded() {
-            frame1 = document.querySelector('iframe');
-
-            frame2 = document.createElement('iframe');
-            document.body.appendChild(frame2);
-            frame2.onload = checkState;
-
-            frame2.src = frame1.src;
-        }
-
-        function checkState() {
-            debug('Check that the nonce is the same, meaning that the document was only generated once:');
-
-            shouldBeTrue('frame1.contentDocument.querySelector("input").value == frame2.contentDocument.querySelector("input").value');
-            finishJSTest();
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://127.0.0.1:8000/security/xssAuditor/resources/nph-cached.pl?q=%3cscript%3ealert(/XSS/);%3c/script%3e" onload="frameLoaded()"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script-expected.txt
deleted file mode 100644
index ac7eb5a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-Test passes if xss auditor does not mistakenly fire in the middle of chunked content
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-The End
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script.html
deleted file mode 100644
index c18867f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/chunked-big-script.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<body>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-<p>Test passes if xss auditor does not mistakenly fire in the middle of chunked content</p>
-<iframe src="/security/xssAuditor/resources/chunked-big-script.pl?aaaaaaaaaaaaaaaa=999999,&q=<script>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection-expected.txt
deleted file mode 100644
index 9e620ab..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?alert-cookie=1&q=%3Cmeta%20http-equiv=%22Set-Cookie%22%20content=%22xssAuditorTestCookie=FAIL%22%20/%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: PASS
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection.html
deleted file mode 100644
index 443e135..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/cookie-injection.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?alert-cookie=1&q=<meta%20http-equiv=%22Set-Cookie%22%20content=%22xssAuditorTestCookie=FAIL%22%20/>"></iframe>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause-expected.txt
deleted file mode 100644
index d380fbf..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-This test passes if it doesn't crash.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause.html
deleted file mode 100644
index 014967a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/crash-while-loading-tag-with-pause.html
+++ /dev/null
@@ -1,8 +0,0 @@
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-This test passes if it doesn't crash.<br>
-<iframe src="resources/tag-with-pause.php?onclick=alert(1)"></iframe>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work-expected.txt
deleted file mode 100644
index 9c70321..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: PASS
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work.html
deleted file mode 100644
index 39282e0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/data-urls-work.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="data:text/html,<script>alert('PASS');</script>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL-expected.txt
deleted file mode 100644
index 7eb4b8d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 6: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-dom-write-URL.php?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL.html
deleted file mode 100644
index b57bc10..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-URL.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-dom-write-URL.php?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML-expected.txt
deleted file mode 100644
index d8b85191..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: XSS
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML.html
deleted file mode 100644
index d435fb6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-innerHTML.html
+++ /dev/null
@@ -1,21 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.waitUntilDone();
-}
-
-window.onload = function() {
-    if (window.testRunner)
-        testRunner.notifyDone();
-};
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-dom-write-innerHTML.php?q=<img src='about:blank' onerror='alert(String.fromCharCode(0x58,0x53,0x53))'>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-expected.txt
deleted file mode 100644
index 89dcc70e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 6: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-dom-write-location.php?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event-expected.txt
deleted file mode 100644
index 7f8d9b97..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 21: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/anchor-url-dom-write-location-click.php?%3Ca%20id%3D%22anchorLink%22%20href%3D%22%23%22%20onclick%3D%22alert%280%29%22%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event.html
deleted file mode 100644
index 3a3b3ef..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-inline-event.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/anchor-url-dom-write-location-click.php?%3Ca%20id%3D%22anchorLink%22%20href%3D%22%23%22%20onclick%3D%22alert%280%29%22%3EClick%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL-expected.txt
deleted file mode 100644
index 5a358de..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 21: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/anchor-url-dom-write-location-click.php?%3Ca%20id=%22anchorLink%22%20href=%22javascript:alert(String.fromCharCode(0x58,0x53,0x53))%22%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL.html
deleted file mode 100644
index 48011d7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location-javascript-URL.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/anchor-url-dom-write-location-click.php?%3Ca%20id=%22anchorLink%22%20href=%22javascript:alert(String.fromCharCode(0x58,0x53,0x53))%22%3EClick%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location.html
deleted file mode 100644
index 72fd9ce..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/dom-write-location.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-dom-write-location.php?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2-expected.txt
deleted file mode 100644
index bef90bd4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20code=//localhost:8000/fictional.swf%20allowscriptaccess=always%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2.html
deleted file mode 100644
index 7017f2e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed%20code=//localhost:8000/fictional.swf%20allowscriptaccess=always></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-expected.txt
deleted file mode 100644
index 0ce02fa..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20code=data:text/html%3bbase64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute.html
deleted file mode 100644
index 6452f79..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-code-attribute.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed%20code=data:text/html%3bbase64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char-expected.txt
deleted file mode 100644
index 21a7296..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char.html
deleted file mode 100644
index 1a1fc4c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-control-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05'></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-expected.txt
deleted file mode 100644
index bf78b92f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated-expected.txt
deleted file mode 100644
index 2c47407..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/intercept/echo-intertag.pl/%3Cembed%20height=%22500%22src=%22https://127.0.0.1:8443/security/xssAuditor/resources/dummy.swf%22.xml&clutter=%3Cp%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Check that the XSSAuditor catches reflected tags in path components
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated.html
deleted file mode 100644
index 9f404fe..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-in-path-unterminated.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>Check that the XSSAuditor catches reflected tags in path components</p>
-<iframe src="http://localhost:8000/security/xssAuditor/intercept/echo-intertag.pl/<embed height=%22500%22src=%22https://127.0.0.1:8443/security/xssAuditor/resources/dummy.swf%22.xml&clutter=<p>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url-expected.txt
deleted file mode 100644
index d7176f7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20src=%27javascript:alert(document.domain)%27%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url.html
deleted file mode 100644
index 1994cbb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-javascript-url.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed src='javascript:alert(document.domain)'></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char-expected.txt
deleted file mode 100644
index cf6da80..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cembed%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%3E%3C/embed%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char.html
deleted file mode 100644
index e56d1bb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf'></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag.html
deleted file mode 100644
index 1f049c5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/embed-tag.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<embed name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf'></embed>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1-expected.txt
deleted file mode 100644
index 1a76ce87..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-<"script">alert('innocent code')Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1.html
deleted file mode 100644
index eca586c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script1.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3C%22script%22%3Ealert(%27innocent%20code%27)%3C/script%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2-expected.txt
deleted file mode 100644
index 5342b82..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-<'script'>alert('innocent code')Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2.html
deleted file mode 100644
index c861a70..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script2.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3C%27script%27%3Ealert(%27innocent%20code%27)%3C/script%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3-expected.txt
deleted file mode 100644
index 8d50320..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-"<[whatever]script>alert('innocent code')Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3.html
deleted file mode 100644
index 6e9f59d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/faux-script3.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%22%3C[whatever]script%3Ealert(%27innocent%20code%27)%3C/script%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-expected.txt
deleted file mode 100644
index 83e8365..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cform%20action=http://127.0.0.1:8000/foo&clutter=bar%20method=x%3E%3Cinput%20type=submit%3E%3Cinput%20name=x%20value=%27Please%20type%20your%20PIN.%27%3E&notifyDone=1&showAction=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: Form action set to data:,
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty-expected.txt
deleted file mode 100644
index 8b13789..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty.html
deleted file mode 100644
index c6df7281..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action-unquoted-empty.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-form-action-unquoted.pl?q=>&someAction<blah"
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action.html
deleted file mode 100644
index 5de834d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/form-action.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<form%20action=http://127.0.0.1:8000/foo&clutter=bar%20method=x><input%20type=submit><input%20name=x%20value='Please%20type%20your%20PIN.'>&notifyDone=1&showAction=1">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button-expected.txt
deleted file mode 100644
index 931d0c8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cform%3E%3Cbutton%20formaction=%27http://example.com/%27%3E&notifyDone=1&showFormaction=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: formaction present on BUTTON with value of data:,
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button.html
deleted file mode 100644
index f13e384..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-button.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<form><button%20formaction='http://example.com/'>&notifyDone=1&showFormaction=1"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input-expected.txt
deleted file mode 100644
index df74291..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cform%3E%3Cinput%20formaction=%27http://example.com/%27%3E&notifyDone=1&showFormaction=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-ALERT: formaction present on INPUT with value of data:,
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input.html
deleted file mode 100644
index 760139d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/formaction-on-input.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<form><input%20formaction='http://example.com/'>&notifyDone=1&showFormaction=1"></iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection-expected.txt
deleted file mode 100644
index bd20bfc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?inHead=1&q=%3Cframeset%3E%3Cframe%20src=%27data:text/html,%3Cscript%3Ealert(0)%3C/script%3E%27%3E%3C/frameset%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection.html
deleted file mode 100644
index 6a568b1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/frameset-injection.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?inHead=1&q=<frameset><frame src='data:text/html,<script>alert(0)</script>'></frameset>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href-expected.txt
deleted file mode 100644
index d6cc8e7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-head-base-href.pl?enable-full-block=1&q=%3Cbase%20href=%27http://localhost:8000/security/xssAuditor/resources/base-href/%27%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href.html
deleted file mode 100644
index d94fb02..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-base-href.html
+++ /dev/null
@@ -1,20 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-head-base-href.pl?enable-full-block=1&q=<base href='http://localhost:8000/security/xssAuditor/resources/base-href/'>">
-</iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe-expected.txt
deleted file mode 100644
index 968dd1c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe-expected.txt
+++ /dev/null
@@ -1,8 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert%28String.fromCharCode%280x58%2C0x53%2C0x53%29%29%3C%2Fscript%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe.html
deleted file mode 100644
index 9c30f3c6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-get-from-iframe.html
+++ /dev/null
@@ -1,25 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-function done()
-{
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-window.onload = function()
-{
-    sendRequestFromIFrame("http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl","enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<\/script>","GET", done);
-};
-</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
deleted file mode 100644
index f0b0e9c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html
deleted file mode 100644
index 7aa4ae6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit-expected.txt
deleted file mode 100644
index b622438..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/XSS/)%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the header X-XSS-Protection is not inherited by the iframe below:
-
---------
-Frame: 'frame'
---------
-If you see this message and no JavaScript alert() then the test PASSED.
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php
deleted file mode 100644
index 77707a9b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php
+++ /dev/null
@@ -1,22 +0,0 @@
-<?php
-header("X-XSS-Protection: 1; mode=block");
-?>
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://127.0.0.1:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the header X-XSS-Protection is not inherited by the iframe below:</p>
-<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(/XSS/)</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link-expected.txt
deleted file mode 100644
index 5fd559a3d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?enable-full-block=1&elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link.html
deleted file mode 100644
index 7319bb7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-javascript-link.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?enable-full-block=1&elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick-expected.txt
deleted file mode 100644
index 5924823..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Ca%20onclick=%27alert(String.fromCharCode(0x58,0x53,0x53))%27%3EClick%3C/a%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick.html
deleted file mode 100644
index 651dec16..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-link-onclick.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<a%20onclick='alert(String.fromCharCode(0x58,0x53,0x53))'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt
deleted file mode 100644
index 86577ae..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cobject%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://localhost:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag.html
deleted file mode 100644
index 6dc765d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-object-tag.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<object name='plugin' type='application/x-blink-test-plugin'><param name='movie' value='http://localhost:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe-expected.txt
deleted file mode 100644
index 4889a8a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe-expected.txt
+++ /dev/null
@@ -1,8 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe.html
deleted file mode 100644
index 97a2cd4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-post-from-iframe.html
+++ /dev/null
@@ -1,25 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-function done()
-{
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-window.onload = function()
-{
-    sendRequestFromIFrame("http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl","enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<\/script>","POST", done);
-};
-</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
deleted file mode 100644
index 14eef55c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
+++ /dev/null
@@ -1,10 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 19: PASS: Cross-origin access threw: 'TypeError: Cannot read property 'referrer' of null'.
-ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E'
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html
deleted file mode 100644
index 03dc4d0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html
+++ /dev/null
@@ -1,30 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-
-function checkframe()
-{
-    try {
-        var ref = document.getElementById("frame").contentDocument.referrer;
-        console.log('FAIL: Referrer is "' + ref + '"');
-    } catch (e) {
-        console.log('PASS: Cross-origin access threw: \'' + e.toString() + '\'.');
-    }
-    checkIfFrameLocationMatchesSrcAndCallDone('frame');
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkframe()" src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-expected.txt
deleted file mode 100644
index 3d54e87..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-expected.txt
+++ /dev/null
@@ -1,10 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 19: FAIL: same-origin access threw: 'TypeError: Cannot read property 'referrer' of null'.
-ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E'
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt
deleted file mode 100644
index b31874b8e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%20src=%27http://localhost:8000/security/xssAuditor/resources/xss.js%27%3E%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-The loading of iframe below should be blocked:
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html
deleted file mode 100644
index 1319471..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<script src='http://localhost:8000/security/xssAuditor/resources/xss.js'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag.html
deleted file mode 100644
index e890275..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/full-block-script-tag.html
+++ /dev/null
@@ -1,30 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-
-function checkframe()
-{
-    try {
-        var ref = document.getElementById("frame").contentDocument.referrer;
-        console.log('PASS: Referrer is "' + ref + '"');
-    } catch (e) {
-        console.log('FAIL: same-origin access threw: \'' + e.toString() + '\'.');
-    }
-    checkIfFrameLocationMatchesSrcAndCallDone('frame');
-}
-</script>
-</head>
-<body>
-<p>The loading of iframe below should be blocked:</p>
-<iframe id="frame" name="frame" onload="checkframe()" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe-expected.txt
deleted file mode 100644
index ea27094..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&q=%3Cscript%3Ealert%28String.fromCharCode%280x58%2C0x53%2C0x53%29%29%3C%2Fscript%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe.html
deleted file mode 100644
index e0b4cb0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/get-from-iframe.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-window.onload = function()
-{
-    sendRequestFromIFrame("http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl","notifyDone=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<\/script>","GET");
-};
-</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS-expected.txt
deleted file mode 100644
index 2616abf..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%22%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE WARNING: HTML Imports is deprecated and will be removed in M80, around February 2020. Please use ES modules instead. See https://www.chromestatus.com/features/5144752345317376 and https://developers.google.com/web/updates/2019/07/web-components-time-to-upgrade for more details.
-This test passes if the XSSAuditor blocks the load prior to the CORS restriction kicking in. We've not bothered to enable CORS for this test, unlike what a real attacker would do, so a CORS error here means failure.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS.html
deleted file mode 100644
index 45dd424..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-CORS.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%22%3e">
-</iframe>
-<p>This test passes if the XSSAuditor blocks the load prior to the CORS restriction kicking in.  We've not bothered to enable
-CORS for this test, unlike what a real attacker would do, so a CORS error here means failure.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-expected.txt
deleted file mode 100644
index 8da7229a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%253cscript%253ealert(/XSS/)%253c/script%253e%22%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE WARNING: HTML Imports is deprecated and will be removed in M80, around February 2020. Please use ES modules instead. See https://www.chromestatus.com/features/5144752345317376 and https://developers.google.com/web/updates/2019/07/web-components-time-to-upgrade for more details.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list-expected.txt
deleted file mode 100644
index e6319f81..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22dont%20import%20me%22%20href=%22http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%253cscript%253ealert(/XSS/)%253c/script%253e%22%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE WARNING: HTML Imports is deprecated and will be removed in M80, around February 2020. Please use ES modules instead. See https://www.chromestatus.com/features/5144752345317376 and https://developers.google.com/web/updates/2019/07/web-components-time-to-upgrade for more details.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list.html
deleted file mode 100644
index d46c784..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-list.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22dont%20import%20me%22%20href=%22http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%253cscript%253ealert(/XSS/)%253c/script%253e%22%3e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe-expected.txt
deleted file mode 100644
index 8a35b50..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe-expected.txt
+++ /dev/null
@@ -1,7 +0,0 @@
-CONSOLE WARNING: HTML Imports is deprecated and will be removed in M80, around February 2020. Please use ES modules instead. See https://www.chromestatus.com/features/5144752345317376 and https://developers.google.com/web/updates/2019/07/web-components-time-to-upgrade for more details.
-This test passes if the "safe" HTML5 import occurs, because XSSAuditor gives a pass to resources from the same origin to cut down on the false positive rate.
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe.html
deleted file mode 100644
index bda0321..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-safe.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.dumpChildFrames();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://localhost:8000/security/xssAuditor/resources/safe-html.html%22%3e">
-</iframe>
-<p>This test passes if the "safe" HTML5 import occurs, because XSSAuditor gives a pass to resources from the same origin to cut down on the false positive rate.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol-expected.txt
deleted file mode 100644
index 4a763914..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=import%20href=http:%26sol%3b%26sol%3blocalhost:8000%26sol%3bsecurity%26sol%3bxssAuditor%26sol%3bresources%26sol%3bxss.html%26quest%3b' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE WARNING: HTML Imports is deprecated and will be removed in M80, around February 2020. Please use ES modules instead. See https://www.chromestatus.com/features/5144752345317376 and https://developers.google.com/web/updates/2019/07/web-components-time-to-upgrade for more details.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol.html
deleted file mode 100644
index 303939a2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import-sol.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=import%20href=http:%26sol%3b%26sol%3blocalhost:8000%26sol%3bsecurity%26sol%3bxssAuditor%26sol%3bresources%26sol%3bxss.html%26quest%3b">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import.html
deleted file mode 100644
index 23f845e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/html5-import.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%253cscript%253ealert(/XSS/)%253c/script%253e%22%3e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2-expected.txt
deleted file mode 100644
index 98f3db2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-This test passes because the injected iframe is from about:blank and is harmless.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2.html
deleted file mode 100644
index 9826a66..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-2.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-This test passes because the injected iframe is from about:blank and is harmless.<br/>
-<iframe src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20src='about:blank'></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3-expected.txt
deleted file mode 100644
index c23049c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-This test passes because the injected iframe has an empty src and is harmless.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3.html
deleted file mode 100644
index 9340db4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-3.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-This test passes because the injected iframe has an empty src and is harmless.<br/>
-<iframe src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20src=''></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-expected.txt
deleted file mode 100644
index 2c140421..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-This test passes because the injected iframe is from the same host as the child frame.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed.html
deleted file mode 100644
index 802029e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-allowed.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-This test passes because the injected iframe is from the same host as the child frame.<br/>
-<iframe src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20src='http://127.0.0.1:8000/'></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-expected.txt
deleted file mode 100644
index 6d6ee6b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=%27http://127.0.0.1:8000/%27%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection.html
deleted file mode 100644
index add4e13..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-injection.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20src='http://127.0.0.1:8000/'></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-expected.txt
deleted file mode 100644
index 22e0bf5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=javascript:alert(document.domain)%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding-expected.txt
deleted file mode 100644
index c39f596..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3CIFRAME%20src=%27javascript:alert%26%23x25%3B281)%27%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding.html
deleted file mode 100644
index 5daf248..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-more-encoding.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<IFRAME%20src='javascript:alert%26%23x25%3B281)'>"</iframe>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode-expected.txt
deleted file mode 100644
index 1982f2e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=%22javascript:%20%250Aalert(String.fromCharCode(0x58,0x53,0x53))%22%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode.html
deleted file mode 100644
index d75eccf..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe src="javascript: %250Aalert(String.fromCharCode(0x58,0x53,0x53))"></iframe>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2-expected.txt
deleted file mode 100644
index 803ea42..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=%22javascript:%20//%250Aalert(String.fromCharCode(0x58,0x53,0x53))%22%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2.html
deleted file mode 100644
index d58be58..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe src="javascript: //%250Aalert(String.fromCharCode(0x58,0x53,0x53))"></iframe>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3-expected.txt
deleted file mode 100644
index fff348a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=%22javascript://%250Aalert(String.fromCharCode(0x58,0x53,0x53))%22%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3.html
deleted file mode 100644
index a58c947d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe src="javascript://%250Aalert(String.fromCharCode(0x58,0x53,0x53))"></iframe>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded-expected.txt
deleted file mode 100644
index 71b17baf..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=javascript%3A%271%2525251%27%3Balert%28document.domain%29%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded.html
deleted file mode 100644
index 82fa6e4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url-url-encoded.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=javascript%3A%271%2525251%27%3Balert%28document.domain%29%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url.html
deleted file mode 100644
index 8d6eb763..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-javascript-url.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=javascript:alert(document.domain)%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char-expected.txt
deleted file mode 100644
index b788d90..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=GBK&q=%3Ciframe%20onload=%C7Ojavascript:alert(document.domain)%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char.html
deleted file mode 100644
index 47236c86..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-GBK-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=GBK&q=<iframe%20onload=%C7Ojavascript:alert(document.domain)></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag-expected.txt
deleted file mode 100644
index 62c497f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Cscript%3E%3Ciframe%20onload=alert(0)%3E%3C/iframe%3E%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Test that dangerous attributes are still filtered in netsted script contexts.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag.html
deleted file mode 100644
index 2f3daf0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-onload-in-svg-tag.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><script><iframe%20onload=alert(0)></iframe></script></svg>">
-</iframe>
-Test that dangerous attributes are still filtered in netsted script contexts.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-expected.txt
deleted file mode 100644
index 6713646..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20srcdoc=%3Cscript%3Ealert(/FAIL/)%3C/script%3E%20%3E%3C/iframe%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked-expected.txt
deleted file mode 100644
index 5affb6a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-frame-src.pl?q=%22srcdoc=%22%3Cscript%3Ealert(0)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Catch injected srcdoc properties when there is punctuation enabing the auditor
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked.html
deleted file mode 100644
index fb3c4e7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc-property-blocked.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>Catch injected srcdoc properties when there is punctuation enabing the auditor</p>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-frame-src.pl?q=%22srcdoc=%22<script>alert(0)</script>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc.html
deleted file mode 100644
index c6ccb52..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/iframe-srcdoc.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe srcdoc=<script>alert(/FAIL/)</script> ></iframe>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char-expected.txt
deleted file mode 100644
index 0ae11f0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=GBK&q=%3Cimg%20src=%201%20onerror=%C7Ojavascript:alert(document.domain)%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char.html
deleted file mode 100644
index 0a40b83..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-GBK-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=GBK&q=<img%20src=%201%20onerror=%C7Ojavascript:alert(document.domain)>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char-expected.txt
deleted file mode 100644
index 21f2d65..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg%20src=%C3%A4%20onerror=alert(%27%C3%A4%27)%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char.html
deleted file mode 100644
index 65e550f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-accented-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<img%20src=ä%20onerror=alert(%27ä%27)>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding-expected.txt
deleted file mode 100644
index 1998e66..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-default-encode.pl?q=%3Cimg+src=%27%80%27+onerror=%27alert(document.domain)%27' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding.html
deleted file mode 100644
index 555c726..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-default-encode.pl?q=%3Cimg+src='%80'+onerror=%27alert(document.domain)%27">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-expected.txt
deleted file mode 100644
index 54c1eee..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg+src=%27%80%27+onerror=%27alert(document.domain)%27' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char.html
deleted file mode 100644
index c010f8b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg+src='%80'+onerror=%27alert(document.domain)%27">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding-expected.txt
deleted file mode 100644
index f87d0fe..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-default-encode.pl?q=%3Cimg+src=%220%22+onerror=%22/%80/%3Balert(document.domain)%22%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding.html
deleted file mode 100644
index bbf923d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-default-encode.pl?q=%3Cimg+src=%220%22+onerror=%22/%80/%3Balert(document.domain)%22%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-expected.txt
deleted file mode 100644
index 32c9df3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg+src=%220%22+onerror=%22/%80/%3Balert(document.domain)%22%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2.html
deleted file mode 100644
index 1f1a670..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-non-ASCII-char2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg+src=%220%22+onerror=%22/%80/%3Balert(document.domain)%22%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky-expected.txt
deleted file mode 100644
index 8b13789..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky.html
deleted file mode 100644
index fac51ba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-onerror-tricky.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg%20src=1%20'onerror=alert(String.fromCharCode(0x58,0x53,0x53))%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma-expected.txt
deleted file mode 100644
index db2a784..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3cimg%20src=x%20onerror=%22[]&q2=alert(1)%22%3c' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by concatenating them before passing the result to the application. Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test passes if the XSSAuditor logs console messages and no alerts fire.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma.html
deleted file mode 100644
index 4ea9a36..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/img-tag-with-comma.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3cimg%20src=x%20onerror=%22[]&q2=alert(1)%22%3c"></iframe>
-    <p>Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by
-    concatenating them before passing the result to the application.  Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test
-    passes if the XSSAuditor logs console messages and no alerts fire.</p>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities-expected.txt
deleted file mode 100644
index 37a1c163..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg%20src=1%20onerror=%26%2397%26%23108%26%23101%26%23114%26%23116%26%2340%26%2349%26%2341%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities.html
deleted file mode 100644
index 7633bba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/inline-event-HTML-entities.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cimg%20src=1%20onerror=%26%2397%26%23108%26%23101%26%23114%26%23116%26%2340%26%2349%26%2341%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/intercept/.htaccess b/third_party/blink/web_tests/http/tests/security/xssAuditor/intercept/.htaccess
deleted file mode 100644
index 00abd3b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/intercept/.htaccess
+++ /dev/null
@@ -1,5 +0,0 @@
-# For ease in testing path reflections, pass any path component containing <'"
-# (and subsequent characters) as the "q" query paramter to the script identified
-# by the path components preceeding it.
-RewriteEngine on
-RewriteRule ^([^<"']*)/(.*) /security/xssAuditor/resources/$1?q=$2 [L,NS]
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char-expected.txt
deleted file mode 100644
index bee1119..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x05%26%23x29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char.html
deleted file mode 100644
index 0fd12df..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x05%26%23x29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-expected.txt
deleted file mode 100644
index b18df0f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named-expected.txt
deleted file mode 100644
index cf53423..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23106%26%2397%26%23118%26%2397%26%23115%26%2399%26%23114%26%23105%26%23112%26%23116%26%2358%26%2397%26%23108%26%23101%26%23114%26%23116%26%2340%26%2339%26copy%26%2339%26%2341%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named.html
deleted file mode 100644
index 4a950c8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-named.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23106%26%2397%26%23118%26%2397%26%23115%26%2399%26%23114%26%23105%26%23112%26%23116%26%2358%26%2397%26%23108%26%23101%26%23114%26%23116%26%2340%26%2339%26copy%26%2339%26%2341%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char-expected.txt
deleted file mode 100644
index a5696d7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x00%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char.html
deleted file mode 100644
index f30586ce..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x00%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities.html
deleted file mode 100644
index 9060344..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-HTML-entities.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%26%23x0000006a%26%23x61%26%23x76%26%23x61%26%23x73%26%23x63%26%23x72%26%23x69%26%23x70%26%23x74%26%23x3a%26%23x61%26%23x6c%26%23x65%26%23x72%26%23x74%26%23x28%26%23x31%26%23x29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand-expected.txt
deleted file mode 100644
index b8d7aa2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%28/%26XSS/%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand.html
deleted file mode 100644
index 45306a9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-ampersand.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%28/%26XSS/%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char-expected.txt
deleted file mode 100644
index 62a8077e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%28/XSS%05/%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char.html
deleted file mode 100644
index b5e059b5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%28/XSS%05/%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2-expected.txt
deleted file mode 100644
index 22fe5ff..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%22%26%23x1javasc%09ript%3Aalert%28/XSS%05/%29%22%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2.html
deleted file mode 100644
index 74e319a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-control-char2.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3D%22%26%23x1javasc%09ript%3Aalert%28/XSS%05/%29%22%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-expected.txt
deleted file mode 100644
index 55fed92..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char-expected.txt
deleted file mode 100644
index 2934de9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aal%00ert%280%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char.html
deleted file mode 100644
index 9c4d623..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-null-char.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aal%00ert%280%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one-expected.txt
deleted file mode 100644
index 55fed92..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one.html
deleted file mode 100644
index a3d373c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-one-plus-one.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe.html
deleted file mode 100644
index bc209119..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-safe.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/javascript-link-safe.php?q=alert('This is a safe script.')">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded-expected.txt
deleted file mode 100644
index ae9af40..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 14: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3A%271%2525251%27%3Balert%28/%26XSS/%29%3Etest%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded.html
deleted file mode 100644
index 07f150d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link-url-encoded.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3A%271%2525251%27%3Balert%28/%26XSS/%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link.html
deleted file mode 100644
index a3d373c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/javascript-link.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand-expected.txt
deleted file mode 100644
index 96c8180..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%20onclick=%27alert(1%261)%27%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand.html
deleted file mode 100644
index 73735304..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-ampersand.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<a%20onclick='alert(1%261)'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char-expected.txt
deleted file mode 100644
index ac808e3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%20onclick=%27al%05ert(0)%27%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char.html
deleted file mode 100644
index bbe6f36..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-control-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<a%20onclick='al%05ert(0)'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities-expected.txt
deleted file mode 100644
index c31db1b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%20href=%27about:blank%27%20onclick=%27alert(String.fromCharCode(0x58,0x53,0x53))//%26amp%3Bcopy%3B%27%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities.html
deleted file mode 100644
index 58884c0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-entities.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<a%20href='about:blank'%20onclick='alert(String.fromCharCode(0x58,0x53,0x53))//%26amp%3Bcopy%3B'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-expected.txt
deleted file mode 100644
index a42a34b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%20onclick=%27alert(String.fromCharCode(0x58,0x53,0x53))%27%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char-expected.txt
deleted file mode 100644
index cb35ce9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%20onclick=%27al%00ert(0)%27%3EClick%3C/a%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char.html
deleted file mode 100644
index f50321f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<a%20onclick='al%00ert(0)'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick.html
deleted file mode 100644
index 3bc5f88d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-onclick.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<a%20onclick='alert(String.fromCharCode(0x58,0x53,0x53))'>Click</a>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window-expected.txt
deleted file mode 100644
index 7368e9f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Click me
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window.html
deleted file mode 100644
index 24f26cb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/link-opens-new-window.html
+++ /dev/null
@@ -1,24 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setCanOpenWindows();
-    testRunner.setCloseRemainingWindowsWhenComplete(true);
-}
-window.onload = function()
-{
-    var event = document.createEvent('MouseEvent');
-    event.initEvent('click', true, true);
-    document.getElementById('anchorLink').dispatchEvent(event);
-}
-</script>
-</head>
-<body>
-<a id="anchorLink" href="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>" target="_blank">Click me</a>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML-expected.txt
deleted file mode 100644
index 05d9a3b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML-expected.txt
+++ /dev/null
@@ -1,7 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%3Cimg/src/onerror=alert(1)//%3C' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML.html
deleted file mode 100644
index ea74723..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-HTML.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ca%3Cimg/src/onerror=alert(1)//%3C'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1-expected.txt
deleted file mode 100644
index b6afee4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1-expected.txt
+++ /dev/null
@@ -1,10 +0,0 @@
-CONSOLE ERROR: Error parsing header X-XSS-Protection: 12345678901234567: expected token to be 0 or 1 at character position 0. The default protections will be applied.
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The auditor was enabled as the server did not send an 'X-XSS-Protection' header.
-This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds 16 characters, and that an error is reported.
-
---------
-Frame: 'frame'
---------
-If you see this message and no JavaScript alert() then the test PASSED.
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
deleted file mode 100644
index aa85753..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds <a href="https://bugs.webkit.org/show_bug.cgi?id=27312#c13">16 characters, and that an error is reported.</a></p>
-<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url-expected.txt
deleted file mode 100644
index 67f5cb5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-head.pl?q=%3Cmeta+http-equiv%3D%22refresh%22+content%3D%220%3B+url%3Djavascript%3Aalert%28document.domain%29%22%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url.html
deleted file mode 100644
index fe9194e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url.html
+++ /dev/null
@@ -1,22 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-}
-
-function done()
-{
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-</script>
-</head>
-<body>
-<iframe onload="done()" src="http://localhost:8000/security/xssAuditor/resources/echo-head.pl?q=%3Cmeta+http-equiv%3D%22refresh%22+content%3D%220%3B+url%3Djavascript%3Aalert%28document.domain%29%22%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-x-frame-options-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-x-frame-options-expected.txt
deleted file mode 100644
index c2f0d16..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/meta-tag-http-refresh-x-frame-options-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: Refused to display 'http://localhost:8000/security/xssAuditor/resources/echo-head.pl?q=%3Cmeta+http-equiv%3D%22x-frame-options%22+content%3D%22deny%22%3E' in a frame because it set 'X-Frame-Options' to 'deny'.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag-expected.txt
deleted file mode 100644
index b1a0feb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: /PASS/
-This script should run because XSS protection is disabled.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag.html
deleted file mode 100644
index f605a7c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/no-protection-script-tag.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This script should run because XSS protection is disabled.</p>
-<iframe id="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?disable-protection=1&q=<script>alert(/PASS/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame-expected.txt
deleted file mode 100644
index e8c22b8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame-expected.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-PASS
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame.html
deleted file mode 100644
index c365c83..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/non-block-javascript-url-frame.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.dumpChildFrames();
-}
-</script>
-</head>
-<body>
-<iframe src="javascript:'PASS'"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char-expected.txt
deleted file mode 100644
index f6f36d2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char-expected.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char.html
deleted file mode 100644
index 8310a2d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-control-char.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src='resources/utilities.js'></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='movie' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05' /><embed id='embed' name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%05' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-expected.txt
deleted file mode 100644
index 050ac3b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-expected.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char-expected.txt
deleted file mode 100644
index 66b5d4f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char-expected.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3Cembed%20id=%27embed%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%20src=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char.html
deleted file mode 100644
index 84d56c8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag-null-char.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='movie' value='http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf' /><embed id='embed' name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag.html
deleted file mode 100644
index f278790..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-embed-tag.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='movie' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /><embed id='embed' name='plugin' type='application/x-blink-test-plugin' src='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject-expected.txt
deleted file mode 100644
index 8b13789..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject.html
deleted file mode 100644
index 6efd860..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-src-inject.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  testRunner.setDumpConsoleMessages(false); // See https://crbug.com/862959
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-object-src.pl?wait-for-load=1&q=http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url-expected.txt
deleted file mode 100644
index b1d19df6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20data=%27javascript:alert(document.domain)%27%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url.html
deleted file mode 100644
index cbd5423..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-javascript-url.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' data='javascript:alert(document.domain)'></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code-expected.txt
deleted file mode 100644
index 6e4e1375..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27code%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27code%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code.html
deleted file mode 100644
index ce884c1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-code.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='code' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data-expected.txt
deleted file mode 100644
index fa3a4a6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27data%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27data%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data.html
deleted file mode 100644
index 0582c68..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-data.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='data' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie-expected.txt
deleted file mode 100644
index e544f00..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27movie%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie.html
deleted file mode 100644
index 4645da0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-movie.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='movie' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src-expected.txt
deleted file mode 100644
index 8eb23b9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27src%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27src%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src.html
deleted file mode 100644
index 4e0c13b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-src.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='src' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url-expected.txt
deleted file mode 100644
index 2be6feb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27url%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 8: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=%3Cobject%20id=%27object%27%20name=%27plugin%27%20type=%27application/x-blink-test-plugin%27%3E%3Cparam%20name=%27url%27%20value=%27http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf%27%20/%3E%3C/object%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url.html
deleted file mode 100644
index b4dde63..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/object-tag-param-url.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-  notifyDoneAfterReceivingLoaded();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?wait-for-load=1&q=<object id='object' name='plugin' type='application/x-blink-test-plugin'><param name='url' value='http://127.0.0.1:8000/security/xssAuditor/resources/dummy.swf' /></object>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body-expected.txt
deleted file mode 100644
index 85935457..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=alert(String.fromCharCode(0x58,0x53,0x53))//' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body.html
deleted file mode 100644
index bf5fdac..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-attribute-body.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=alert(String.fromCharCode(0x58,0x53,0x53))//">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe-expected.txt
deleted file mode 100644
index e52f201..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20onload=alert(String.fromCharCode(0x58,0x53,0x53))//' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe.html
deleted file mode 100644
index 2445b67..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-event-handler-iframe.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20onload=alert(String.fromCharCode(0x58,0x53,0x53))//">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01-expected.txt
deleted file mode 100644
index da5093b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Ciframe%20src=javascript:alert(1)%3B//%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01.html
deleted file mode 100644
index 2a20ec2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-01.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<iframe%20src=javascript:alert(1)%3B//>"></iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02-expected.txt
deleted file mode 100644
index f880d87..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Ciframe%20src=javascript:alert(1)%3B//' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02.html
deleted file mode 100644
index c7f502f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-02.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<iframe%20src=javascript:alert(1)%3B//"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03-expected.txt
deleted file mode 100644
index 445c3b89..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Ciframe%20src=%22javascript:alert(1)%3B%e2%80%a8--%3E&clutter=xxx%22%3E%3C/iframe%3E&notifyDone=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03.html
deleted file mode 100644
index 24d2096..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-iframe-src-03.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<iframe%20src="javascript:alert(1)%3B%e2%80%a8-->&clutter=xxx"></iframe>&notifyDone=1'></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01-expected.txt
deleted file mode 100644
index 6f5299c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Cscript%20src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01.html
deleted file mode 100644
index 72a1401..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-01.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<script%20src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02-expected.txt
deleted file mode 100644
index fcb1d1a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Cscript%20src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02.html
deleted file mode 100644
index fe81014a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-02.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<script%20src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03-expected.txt
deleted file mode 100644
index ce43534..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Cobject%20data=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03.html
deleted file mode 100644
index 8d9fe72..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-03.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<object%20data=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04-expected.txt
deleted file mode 100644
index 5e57e7e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=%3Cobject%20data=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04.html
deleted file mode 100644
index 2cc3750..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/open-script-src-04.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inspan.pl?q=<object%20data=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe-expected.txt
deleted file mode 100644
index 9e1b3f26..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe.html
deleted file mode 100644
index 64f5576..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/post-from-iframe.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-window.onload = function()
-{
-    sendRequestFromIFrame("http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl","notifyDone=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<\/script>","POST");
-};
-</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01-expected.txt
deleted file mode 100644
index 85d0caea0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=%22alert(1)//' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01.html
deleted file mode 100644
index 6ef84e3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-01.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=%22alert(1)//"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02-expected.txt
deleted file mode 100644
index 57853c8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(2)/' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02.html
deleted file mode 100644
index cf603cc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-02.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(2)/"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03-expected.txt
deleted file mode 100644
index 1321202f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=%3cdiv%3e&q=%22%20%22%20onload=alert(3)%3C!--' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03.html
deleted file mode 100644
index 063ce606..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-comment-03.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=%3cdiv%3e&q=%22%20%22%20onload=alert(3)<!--"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01-expected.txt
deleted file mode 100644
index 56e346e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))%26%23x2f%26%2347' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01.html
deleted file mode 100644
index 5c6567b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-01.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))%26%23x2f%26%2347"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02-expected.txt
deleted file mode 100644
index e552173..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=alert(String.fromCharCode(0x58,0x53,0x53))-%26quot' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02.html
deleted file mode 100644
index a3e8123..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-02.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=alert(String.fromCharCode(0x58,0x53,0x53))-%26quot"></iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03-expected.txt
deleted file mode 100644
index a414ad3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))-%26' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03.html
deleted file mode 100644
index 463a467..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-entity-03.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=blah&q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))-%26"></iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-expected.txt
deleted file mode 100644
index b950df5f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long-expected.txt
deleted file mode 100644
index 18f5fea..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(111%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532)' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long.html
deleted file mode 100644
index ad45804..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-long.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(111%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532%2532)">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-expected.txt
deleted file mode 100644
index 40cc544..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: XSS
-This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, the XSSAuditor does not detect breaking out of an unquoted property. A future update may reinstate this functionality.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars-expected.txt
deleted file mode 100644
index 40cc544..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: XSS
-This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, the XSSAuditor does not detect breaking out of an unquoted property. A future update may reinstate this functionality.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars.html
deleted file mode 100644
index de030bb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes-tab-slash-chars.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, 
-the XSSAuditor does not detect breaking out of an unquoted property. A future update may reinstate this 
-functionality.</p>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property-noquotes.pl?q=dummy%09/onload=alert(String.fromCharCode(0x58,0x53,0x53))&dummy=dummy">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes.html
deleted file mode 100644
index fdac79e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-noquotes.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, 
-the XSSAuditor does not detect breaking out of an unquoted property. A future update may reinstate this 
-functionality.</p>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property-noquotes.pl?q=1%20onload=alert(String.fromCharCode(0x58,0x53,0x53))">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01-expected.txt
deleted file mode 100644
index 1e375c9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(1)-%22' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01.html
deleted file mode 100644
index 73e39a3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-01.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(1)-%22"></iframe>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02-expected.txt
deleted file mode 100644
index 0390d8ed..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(2)-%27' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02.html
deleted file mode 100644
index a2b8ec5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-02.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(2)-%27"></iframe>
-</body>
-</html>
-
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03-expected.txt
deleted file mode 100644
index 16b9623..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(3)-%27%22%27%22' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03.html
deleted file mode 100644
index a5d2046..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape-quote-03.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?clutter=5xyzblah&q=%22%20onload=alert(3)-%27%22%27%22"></iframe>
-</body>
-</html>
-
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape.html
deleted file mode 100644
index 17b831e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-escape.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%20onload=%22alert(String.fromCharCode(0x58,0x53,0x53))">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject-expected.txt
deleted file mode 100644
index 93c0f39..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: XSS
-This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, the XSSAuditor does not detect the injection of an inline event handler within a tag. A future update may reinstate this functionality.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject.html
deleted file mode 100644
index f2082fb9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/property-inject.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This test fails because the XSSAuditor allows requests that do not contain illegal URI characters. Thus, 
-the XSSAuditor does not detect the injection of an inline event handler within a tag. A future update may 
-reinstate this functionality.</p>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-inner-tag.pl?q=onload=alert(String.fromCharCode(0x58,0x53,0x53))">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path-expected.txt
deleted file mode 100644
index 00701e5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path-expected.txt
+++ /dev/null
@@ -1,7 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/intercept/echo-form-action.pl/%22%20onmouseover=%22JavaScript:alert(document.domain)%22%20name=%22?m=login' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-This is an iframe with a injected form
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path.html
deleted file mode 100644
index b453f12..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/reflection-in-path.html
+++ /dev/null
@@ -1,21 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-function done()
-{
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/intercept/echo-form-action.pl/%22%20onmouseover=%22JavaScript:alert(document.domain)%22%20name=%22?m=login"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-expected.txt
deleted file mode 100644
index f56d00a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-expected.txt
+++ /dev/null
@@ -1,12 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20not%20dump%20of%20a%20report%20is%20displayed%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the X-XSS-Protection reports are sent out properly
-
---------
-Frame: 'frame'
---------
-CSP report received:
-CONTENT_TYPE: application/xss-auditor-report
-HTTP_REFERER: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20not%20dump%20of%20a%20report%20is%20displayed%20below,%20then%20the%20test%20PASSED.%3C/p%3E
-REQUEST_METHOD: POST
-=== POST DATA ===
-{"xss-report":{"request-url":"http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20not%20dump%20of%20a%20report%20is%20displayed%20below,%20then%20the%20test%20PASSED.%3C/p%3E","request-body":""}}
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https-expected.txt
deleted file mode 100644
index e2188eb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https-expected.txt
+++ /dev/null
@@ -1,11 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'https://127.0.0.1:8443/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20not%20dump%20of%20a%20report%20is%20displayed%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the X-XSS-Protection reports are sent out properly
-
---------
-Frame: 'frame'
---------
-CSP report received:
-CONTENT_TYPE: application/xss-auditor-report
-REQUEST_METHOD: POST
-=== POST DATA ===
-{"xss-report":{"request-url":"https://127.0.0.1:8443/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20not%20dump%20of%20a%20report%20is%20displayed%20below,%20then%20the%20test%20PASSED.%3C/p%3E","request-body":""}}
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https.html
deleted file mode 100644
index ad34bad..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin-https.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="https://127.0.0.1:8443/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection reports are sent out properly</p>
-<iframe name="frame" src="https://127.0.0.1:8443/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and not dump of a report is displayed below, then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin.html
deleted file mode 100644
index 1179be1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-cross-origin.html
+++ /dev/null
@@ -1,25 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-
-function notify() {
-  if (window.testRunner) {
-    setTimeout(testRunner.notifyDone.bind(testRunner), 0);
-  }
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection reports are sent out properly</p>
-<iframe onload="notify()" name="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report-cross-origin=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and not dump of a report is displayed below, then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-expected.txt
deleted file mode 100644
index be4c927..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-expected.txt
+++ /dev/null
@@ -1,12 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the X-XSS-Protection reports are sent out properly
-
---------
-Frame: 'frame'
---------
-CSP report received:
-CONTENT_TYPE: application/xss-auditor-report
-HTTP_REFERER: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E
-REQUEST_METHOD: POST
-=== POST DATA ===
-{"xss-report":{"request-url":"http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E","request-body":""}}
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
deleted file mode 100644
index 10a1349..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
+++ /dev/null
@@ -1,7 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CSP report received:
-CONTENT_TYPE: application/xss-auditor-report
-HTTP_REFERER: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E
-REQUEST_METHOD: POST
-=== POST DATA ===
-{"xss-report":{"request-url":"http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E","request-body":""}}
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block.html
deleted file mode 100644
index 4217a8c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-full-block.html
+++ /dev/null
@@ -1,20 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<script src = '/security/contentSecurityPolicy/resources/go-to-echo-report.js'></script>
-<p>This tests that the X-XSS-Protection reports are sent out properly</p>
-<iframe id="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state-expected.txt
deleted file mode 100644
index be1e85d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state-expected.txt
+++ /dev/null
@@ -1,12 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the X-XSS-Protection reports are sent out properly with the original, unmodified URL even when a history.replaceState() changes it.
-
---------
-Frame: 'frame'
---------
-CSP report received:
-CONTENT_TYPE: application/xss-auditor-report
-HTTP_REFERER: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E
-REQUEST_METHOD: POST
-=== POST DATA ===
-{"xss-report":{"request-url":"http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E","request-body":""}}
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state.html
deleted file mode 100644
index 0b459d4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag-replace-state.html
+++ /dev/null
@@ -1,20 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection reports are sent out properly with
-the original, unmodified URL even when a history.replaceState() changes it.</p>
-<iframe name="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag.html
deleted file mode 100644
index ff7c492..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/report-script-tag.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection reports are sent out properly</p>
-<iframe name="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag.html&echo-report=1&enable-report=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/anchor-url-dom-write-location-click.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/anchor-url-dom-write-location-click.php
deleted file mode 100644
index 5b1be42..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/anchor-url-dom-write-location-click.php
+++ /dev/null
@@ -1,24 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-</head>
-<body>
-<script>
-window.onload = function()
-{
-    window.setTimeout(clickAnchorLink, 100);
-}
-function clickAnchorLink()
-{
-    var event = document.createEvent('MouseEvent');
-    event.initEvent('click', true, true);
-    document.getElementById("anchorLink").dispatchEvent(event);
-    
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-</script>
-<script>document.write(unescape(window.location));</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe2.html
deleted file mode 100644
index e12054a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-<base href='http://localhost:8000/security/xssAuditor/resources/base-href/'>
-</head>
-<body>
-<script src="really-safe-script.js"></script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe3.html
deleted file mode 100644
index 0e7f63f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/base-href-safe3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-<base href='http://localhost:8000/security/xssAuditor/resources/'>
-</head>
-<body>
-<script src="safe-script.js"></script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/really-safe-script.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/really-safe-script.js
deleted file mode 100644
index c9d89e0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/really-safe-script.js
+++ /dev/null
@@ -1 +0,0 @@
-alert('This is a safe script.');
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/safe-script.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/safe-script.js
deleted file mode 100644
index 6372476..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/base-href/safe-script.js
+++ /dev/null
@@ -1 +0,0 @@
-alert(/XSS/);
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/chunked-big-script.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/chunked-big-script.pl
deleted file mode 100755
index 3035efd..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/chunked-big-script.pl
+++ /dev/null
@@ -1,26 +0,0 @@
-#!/usr/bin/perl -wT
-
-my $pre_chunked = ($ENV{"SERVER_SOFTWARE"} && index($ENV{"SERVER_SOFTWARE"}, "LightTPD") != -1);
-
-sub print_maybe_chunked
-{
-    my $string = shift;
-    if ($pre_chunked) {
-        print $string;
-        return;
-    }
-    printf "%lx\r\n", length($string);
-    print "$string\r\n";
-}
-
-print "Content-type: text/html\r\n";
-if (!$pre_chunked) {
-    print "Transfer-encoding: chunked\r\n";
-}
-print "\r\n";
-print_maybe_chunked "<!DOCTYPE html><html><script>var aaaaaaaaaaaaaaaa; var b; aaaaaaaaaaaaaaaa";
-for ($count = 0; $count < 256; $count++) {
-    print_maybe_chunked "=999999,aaaaaaaaaaaaaaaa=999999,aaaaaaaaaaaaaaaa=999999,aaaaaaaaaaaaaaaa";
-}
-print_maybe_chunked "=999999;</script>The End</html>\r\n";
-print_maybe_chunked "";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-URL.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-URL.php
deleted file mode 100644
index 834ae08..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-URL.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-</head>
-<body>
-<script>document.write(unescape(document.URL));</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-innerHTML.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-innerHTML.php
deleted file mode 100644
index abdb7e6b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-innerHTML.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<body>
-<script>
-document.body.innerHTML = unescape(window.location);
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-location.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-location.php
deleted file mode 100644
index 3aaba67..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-location.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-</head>
-<body>
-<script>document.write(unescape(window.location));</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-unescaped-location.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-unescaped-location.php
deleted file mode 100644
index 30b6105..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-dom-write-unescaped-location.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-</head>
-<body>
-<script>document.write(window.location);</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action-unquoted.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action-unquoted.pl
deleted file mode 100755
index 5facd0b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action-unquoted.pl
+++ /dev/null
@@ -1,15 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print "<p>This is an iframe with a injected form</p>\n";
-print "<form method=post id=login action=></form>\n";
-print "<script>if (window.testRunner) testRunner.notifyDone();</script>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action.pl
deleted file mode 100755
index 9084dfc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-form-action.pl
+++ /dev/null
@@ -1,21 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-my $action = $cgi->param('q');
-if ($cgi->param('add-token')) {
-    $action = $action . "&tok=12345678";
-}
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print "<p>This is an iframe with a injected form</p>\n";
-print "<form method=\"post\" id=\"login\" action=\"".$action."\"></form>\n";
-print "<script>if (window.testRunner) testRunner.notifyDone();</script>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-frame-src.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-frame-src.pl
deleted file mode 100755
index 25211fc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-frame-src.pl
+++ /dev/null
@@ -1,15 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print "<iframe src=\"".$cgi->param('q')."\"></iframe>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href-direct.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href-direct.pl
deleted file mode 100755
index 9c282de..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href-direct.pl
+++ /dev/null
@@ -1,18 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<head>\n";
-print "<base href=\"".$cgi->param('q')."\">\n";
-print "</head>\n";
-print "<body>\n";
-print "<script src='safe-script.js'></script>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href.pl
deleted file mode 100755
index 54b120f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head-base-href.pl
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-if ($cgi->param('enable-full-block')) {
-    print "X-XSS-Protection: 1; mode=block\n";
-} else {
-    print "X-XSS-Protection: 1\n";
-}
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<head>\n";
-print $cgi->param('q');
-print "</head>\n";
-print "<body>\n";
-print "<script src='safe-script.js'></script>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head.pl
deleted file mode 100755
index 45019350..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-head.pl
+++ /dev/null
@@ -1,17 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<head>\n";
-print $cgi->param('q');
-print "</head>\n";
-print "<body>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inner-tag.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inner-tag.pl
deleted file mode 100755
index b528f80..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inner-tag.pl
+++ /dev/null
@@ -1,16 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body ";
-print $cgi->param('q');
-print ">\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inspan.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inspan.pl
deleted file mode 100755
index 8d42a9d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-inspan.pl
+++ /dev/null
@@ -1,18 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<html>\n";
-print "<head>\n";
-print '<meta http-equiv="Content-Type" content="text/html;charset=UTF-8">\n';
-print "</head>\n";
-print "<body>\n";
-print "<span>";
-print $cgi->param('q');
-print "</span>hi there<script>hello=1;</script>\n";
-print "</body></html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-addslashes.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-addslashes.pl
deleted file mode 100755
index f3b4ba4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-addslashes.pl
+++ /dev/null
@@ -1,23 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-sub addSlashes
-{
-    my ($str) = @_;
-    $str =~ s/(['"\\])/\\$1/g;
-    $str =~ s/([\0])/\\0/g;
-    return $str;
-}
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print addSlashes($cgi->param('q'));
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-click-and-notify.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-click-and-notify.pl
deleted file mode 100755
index b14517d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-click-and-notify.pl
+++ /dev/null
@@ -1,41 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-if ($cgi->param('enable-full-block')) {
-    print "X-XSS-Protection: 1; mode=block\n";
-} else {
-    print "X-XSS-Protection: 1\n";
-}
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<head>\n";
-print "<script>\n";
-print "window.onload = function()\n";
-print "{\n";
-print "    var event = document.createEvent('MouseEvent');\n";
-print "    event.initEvent('click', true, true);\n";
-print "    document.getElementById('".$cgi->param('elmid')."').dispatchEvent(event);\n";
-print "}\n";
-print "</script>\n";
-print "</head>\n";
-print "<body>\n";
-print $cgi->param('q');
-if ($cgi->param('enable-full-block')) {
-    # Note, when testing a full-page-block, we can't call testRunner.notifyDone()
-    # on the generated page because it takes some time for the frame to be redirected to
-    # about:blank. Hence, the caller of this Perl script must call testRunner.notifyDone()
-    # after the redirect has occurred.
-    print "<p>If you see this message then the test FAILED.</p>\n";
-} else {
-    print "<script>\n";
-    print "if (window.testRunner)\n";
-    print "    testRunner.notifyDone();\n";
-    print "</script>\n";
-}
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl
deleted file mode 100755
index 410a182..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl
+++ /dev/null
@@ -1,79 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-use Encode;
-
-my $cgi = new CGI;
-
-use constant Unicode16BitEscapeSequenceLength => 6; # e.g. %u26C4
-my $unicode16BitEscapeSequenceRegEx = qr#%u([0-9A-Za-z]{1,4})#;
-
-sub isUTF16Surrogate($)
-{
-    my ($number) = @_;
-    return $number >= 0xD800 && $number <= 0xDFFF;
-}
-
-# See <http://en.wikipedia.org/wiki/Percent-encoding#Non-standard_implementations>.
-sub decodeRunOf16BitUnicodeEscapeSequences($)
-{
-    my ($string) = @_;
-    my @codeUnits = grep { length($_) } split(/$unicode16BitEscapeSequenceRegEx/, $string);
-    my $i = 0;
-    my $decodedRun = "";
-    while ($i < @codeUnits) {
-        # FIXME: We fallback to the UTF-8 character if we don't receive a proper high and low surrogate pair.
-        #        Instead, we should add error handling to detect high/low surrogate mismatches and sequences
-        #        of the form low surrogate then high surrogate.
-        my $hexDigitValueOfPossibleHighSurrogate = hex($codeUnits[$i]);
-        if (isUTF16Surrogate($hexDigitValueOfPossibleHighSurrogate) && $i + 1 < @codeUnits) {
-            my $hexDigitValueOfPossibleLowSurrogate = hex($codeUnits[$i + 1]);
-            if (isUTF16Surrogate($hexDigitValueOfPossibleLowSurrogate)) {
-                $decodedRun .= decode("UTF-16LE", pack("S2", $hexDigitValueOfPossibleHighSurrogate, $hexDigitValueOfPossibleLowSurrogate));
-                $i += 2;
-                next;
-            }
-        }
-        $decodedRun .= chr($hexDigitValueOfPossibleHighSurrogate);
-        $i += 1;
-    }
-    return $decodedRun;
-}
-
-sub decode16BitUnicodeEscapeSequences
-{
-    my ($string) = @_;
-    my $stringLength = length($string);
-    my $searchPosition = 0;
-    my $encodedRunPosition = 0;
-    my $decodedPosition = 0;
-    my $result = "";
-    while (($encodedRunPosition = index($string, "%u", $searchPosition)) >= 0) {
-        my $encodedRunEndPosition = $encodedRunPosition;
-        while ($stringLength - $encodedRunEndPosition >= Unicode16BitEscapeSequenceLength
-            && substr($string, $encodedRunEndPosition, Unicode16BitEscapeSequenceLength) =~ /$unicode16BitEscapeSequenceRegEx/) {
-            $encodedRunEndPosition += Unicode16BitEscapeSequenceLength;
-        }
-        $searchPosition = $encodedRunEndPosition;
-        if ($encodedRunEndPosition == $encodedRunPosition) {
-            ++$searchPosition;
-            next;
-        }
-        $result .= substr($string, $decodedPosition, $encodedRunPosition - $decodedPosition);
-        $result .= decodeRunOf16BitUnicodeEscapeSequences(substr($string, $encodedRunPosition, $encodedRunEndPosition - $encodedRunPosition));
-        $decodedPosition = $encodedRunEndPosition;
-    }
-    $result .= substr($string, $decodedPosition);
-    return $result;
-}
-
-my $charsetToUse = $cgi->param('charset') ? $cgi->param('charset') : "UTF-8";
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=$charsetToUse\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print decode16BitUnicodeEscapeSequences($cgi->param('q'));
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-default-encode.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-default-encode.pl
deleted file mode 100755
index 3a1b601..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag-default-encode.pl
+++ /dev/null
@@ -1,15 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print $cgi->param('q');
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag.pl
deleted file mode 100755
index a1f655c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-intertag.pl
+++ /dev/null
@@ -1,123 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-# Passing semicolons through the url to this script is problematic. The raw
-# form truncates the input and the %-encoded form isn't being decoded. Hence
-# this set of hard-coded headers.
-if ($cgi->param('disable-protection')) {
-    print "X-XSS-Protection: 0\n";
-} elsif ($cgi->param('enable-full-block')) {
-    print "X-XSS-Protection: 1; mode=block\n";
-} elsif ($cgi->param('enable-report')) {
-    print "X-XSS-Protection: 1; report=/security/contentSecurityPolicy/resources/save-report.php?test=" . $cgi->param('test') . "\n";
-} elsif ($cgi->param('enable-report-cross-origin')) {
-    print "X-XSS-Protection: 1; report=http://localhost:8080/security/contentSecurityPolicy/resources/save-report.php?test=" . $cgi->param('test') . "\n";
-} elsif ($cgi->param('enable-full-block-report')) {
-    print "X-XSS-Protection: 1; mode=block; report=/security/contentSecurityPolicy/resources/save-report.php?test=" . $cgi->param('test') . "\n";
-} elsif ($cgi->param('valid-header')) {
-    if ($cgi->param('valid-header') == 1) {
-        print "X-XSS-Protection:   1  ;MoDe =  bLocK   \n";
-    }
-    if ($cgi->param('valid-header') == 2) {
-        print "X-XSS-Protection: 1; \n";
-    }
-    if ($cgi->param('valid-header') == 3) {
-        print "X-XSS-Protection: 1; mode=block; \n";
-    }
-    if ($cgi->param('valid-header') == 4) {
-        print "X-XSS-Protection: 1; report=/security/contentSecurityPolicy/resources/nonesuch.php; mode=block; \n";
-    }
-} elsif ($cgi->param('malformed-header')) {
-    if ($cgi->param('malformed-header') == 1) {
-        print "X-XSS-Protection: 12345678901234567\n";
-    }
-} else {
-    print "X-XSS-Protection: 1\n";
-}
-
-print "Content-Type: text/html; charset=";
-print $cgi->param('charset') ? $cgi->param('charset') : "UTF-8";
-print "\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-if ($cgi->param('wait-for-load')) {
-    print "<script>\n";
-    print "onload = function() {\n";
-    print "    window.parent.postMessage('loaded', '*');\n";
-    print "}";
-    print "</script>\n";
-}
-if ($cgi->param('inHead')) {
-    print "<head>\n";
-} else {
-    print "<body>\n";
-}
-if ($cgi->param('replaceState')) {
-    print "<script>history.replaceState({}, '', '#must-not-appear');</script>\n";
-}
-my $reflection = $cgi->param('q');
-my $pattern = "\xfe";
-my $replacement = "?";
-$reflection =~ s/$pattern/$replacement/g;  # pretend server translates high character 0xfe into literal "?".
-print $reflection; # XSS reflected here.
-if ($cgi->param('script-expression-follows')) {
-    print "\n <script>42;</script>\n";
-}
-if ($cgi->param('clutter')) {
-    print $cgi->param('clutter');
-}
-if ($cgi->param('q2')) {
-    print $cgi->param('q2');
-}
-if ($cgi->param('showAction')) {
-    print "<script>\n";
-    print "    alert('Form action set to ' + document.forms[0].action);\n";
-    print "</script>\n";
-}
-if ($cgi->param('showFormaction')) {
-    print "<script>\n";
-    print "    var e = document.querySelector('[formaction]');\n";
-    print "    if (e)\n";
-    print "        alert('formaction present on ' + e.nodeName + ' with value of ' + e.getAttribute('formaction'));\n";
-    print "</script>\n";
-}
-if ($cgi->param('dumpElementBySelector')) {
-    print "<pre id='console'></pre>\n";
-    print "<script>\n";
-    print "    var e = document.querySelector('" . $cgi->param('dumpElementBySelector') . "');\n";
-    print "    if (e) {\n";
-    print "        var log = '" . $cgi->param('dumpElementBySelector') . " => ' + e.nodeName + '\\n';\n";
-    print "        for (var i = 0; i < e.attributes.length; i++) {\n";
-    print "            log += '* ' + e.attributes[i].name + ': ' + e.attributes[i].value + '\\n';\n";
-    print "        }\n";
-    print "        document.getElementById('console').innerText = log;\n";
-    print "    } else\n";
-    print "        alert('No element matched the given selector.');\n";
-    print "</script>\n";
-}
-if ($cgi->param('notifyDone')) {
-    print "<script>\n";
-    print "if (window.testRunner)\n";
-    print "    testRunner.notifyDone();\n";
-    print "</script>\n";
-}
-if ($cgi->param('enable-full-block') || $cgi->param('enable-full-block-report')) {
-    print "<p>If you see this message then the test FAILED.</p>\n";
-}
-if ($cgi->param('alert-cookie')) {
-    print "<script>if (/xssAuditorTestCookie/.test(document.cookie)) { alert('FAIL: ' + document.cookie); document.cookie = 'xssAuditorTestCookie=remove; max-age=-1'; } else alert('PASS');</script>\n";
-}
-if ($cgi->param('echo-report')) {
-    print "<script src=/security/contentSecurityPolicy/resources/go-to-echo-report.js></script>\n";
-}
-print "Page rendered here.\n";
-if ($cgi->param('inHead')) {
-    print "</head>\n";
-} else {
-    print "</body>\n";
-}
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-object-src.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-object-src.pl
deleted file mode 100755
index d93ab1f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-object-src.pl
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<script>\n";
-print "onload = function() {\n";
-print "    window.parent.postMessage('loaded', '*');\n";
-print "}\n";
-print "</script>\n";
-print "<body>\n";
-print "<object id=\"object\" name=\"plugin\" type=\"application/x-blink-test-plugin\">\n";
-print "<param name=\"movie\" value=\"".$cgi->param('q')."\" />\n";
-print "</object>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property-noquotes.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property-noquotes.pl
deleted file mode 100755
index 940637d9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property-noquotes.pl
+++ /dev/null
@@ -1,16 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body foo=";
-print $cgi->param('q');
-print ">\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property.pl
deleted file mode 100755
index 3f665f8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-property.pl
+++ /dev/null
@@ -1,20 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body foo=\"";
-print $cgi->param('q');
-if ($cgi->param('clutter')) {
-    print $cgi->param('clutter');
-}
-print "\">\n";
-print "<script>var y = 123;</script>";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-script-src.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-script-src.pl
deleted file mode 100755
index 389f939..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-script-src.pl
+++ /dev/null
@@ -1,15 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body>\n";
-print "<script src=\"".$cgi->param('q')."\"></script>\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-style-attr-value.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-style-attr-value.pl
deleted file mode 100755
index e1f86d7a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/echo-style-attr-value.pl
+++ /dev/null
@@ -1,14 +0,0 @@
-#!/usr/bin/perl -wT
-use strict;
-use CGI;
-
-my $cgi = new CGI;
-
-print "X-XSS-Protection: 1\n";
-print "Content-Type: text/html; charset=UTF-8\n\n";
-
-print "<!DOCTYPE html>\n";
-print "<html>\n";
-print "<body style=\"background: ".$cgi->param('q').";\">\n";
-print "</body>\n";
-print "</html>\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/javascript-link-safe.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/javascript-link-safe.php
deleted file mode 100644
index f9e0d4c6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/javascript-link-safe.php
+++ /dev/null
@@ -1,19 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-</head>
-<body>
-<a id="anchorLink" href="javascript:alert('This is a safe script.')">test</a>
-<script>
-    var event = document.createEvent('MouseEvent');
-    event.initEvent('click', true, true);
-    document.getElementById('anchorLink').dispatchEvent(event);
-
-    setTimeout(function() {
-        if (window.testRunner)
-            testRunner.notifyDone();
-    }, 0);
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/nph-cached.pl b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/nph-cached.pl
deleted file mode 100755
index 58b560c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/nph-cached.pl
+++ /dev/null
@@ -1,31 +0,0 @@
-#!/usr/bin/perl
-# Script to generate a 304 HTTP status with (illegal) X-XSS-Protect headers.
-# Relies on its nph- filename to invoke the CGI non-parsed-header facility.
-
-$protocol = $ENV{'SERVER_PROTOCOL'};
-$software = $ENV{'SERVER_SOFTWARE'};
-$if_modified = $ENV{'HTTP_IF_MODIFIED_SINCE'};
-$nonce = int(rand(100000));
-
-if ($if_modified) {
-    print "$protocol 304 Not Modified\r\n";
-    print "Server: $software\r\n";
-    print "X-XSS-Protection: 0\r\n";
-    print "Connection: close\r\n";
-    exit(0);
-}
-
-print "$protocol 200 OK\r\n";
-print "Server: $software\r\n";
-print "Content-type: text/html\r\n";
-print "Expires: Wed, 21 Nov 2037 19:19:13 +0000\r\n";
-print "Last-Modified: Mon, 08 Nov 2010 19:19:13 +0000\r\n";
-print "X-XSS-Protection: 1\r\n";
-print "\r\n";
-print "<!DOCTYPE html>\r\n";
-print "<html>\r\n";
-print "<body>\r\n";
-print "<input id=\"rand\" type=\"text\" value=\"$nonce\"/>\r\n";
-print "<script>alert(/XSS/);</script>\r\n";
-print "</body>\r\n";
-print "</html>\r\n";
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/redir.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/redir.php
deleted file mode 100644
index e0e72fe3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/redir.php
+++ /dev/null
@@ -1,3 +0,0 @@
-<?php
-header("Location: ".$_GET["url"]);
-?>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script-noquotes.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script-noquotes.js
deleted file mode 100644
index 7e685e4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script-noquotes.js
+++ /dev/null
@@ -1 +0,0 @@
-alert(/This is a safe script./);
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script.js
deleted file mode 100644
index c9d89e0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe-script.js
+++ /dev/null
@@ -1 +0,0 @@
-alert('This is a safe script.');
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe.php.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe.php.html
deleted file mode 100644
index 6e51e0a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/safe.php.html
+++ /dev/null
@@ -1,6 +0,0 @@
-<!DOCTYPE html>
-<html>
-<body>
-This file is used by tests that safely include HTML.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe2.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe2.php
deleted file mode 100644
index 1addce0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe2.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-<script>alert(/This is a safe script./)</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe3.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe3.php
deleted file mode 100644
index 5ca4e63..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe3.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-<script src='http://localhost:8000/security/xssAuditor/resources/safe-script-noquotes.js'></script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe4-frame.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe4-frame.php
deleted file mode 100644
index c1f67fbc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/script-tag-safe4-frame.php
+++ /dev/null
@@ -1,10 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://127.0.0.1:8000/foo"></script>
-<img src="http://127.0.0.1:8000/foo"/>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/static-script.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/static-script.php
deleted file mode 100644
index 311c9e0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/static-script.php
+++ /dev/null
@@ -1,10 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<!DOCTYPE html>
-<html>
-<p>This is a page with a static script matching a post variable</p>
-<script>yourname=hunter</script>
-<script>
-if (window.testRunner)
-    testRunner.notifyDone();
-</script>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/tag-with-pause.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/tag-with-pause.php
deleted file mode 100644
index f5c8e25..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/tag-with-pause.php
+++ /dev/null
@@ -1,19 +0,0 @@
-<?
-header("X-XSS-Protection: 1");
-header("Content-Type: text/html; charset=utf-8");
-?>
-<!-- <?php
-# Spam a bunch of As to make sure we blow past any buffers.
-print str_repeat("A", 2048);
-?> -->
-<body>
-<?php
-print "<a ona";
-print str_repeat("a", 2000);
-
-flush();
-usleep(200000);
-
-print "click=alert(1) ttt>";
-?>
-Done.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/utilities.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/utilities.js
deleted file mode 100644
index a85d09c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/utilities.js
+++ /dev/null
@@ -1,75 +0,0 @@
-function checkIfFrameLocationMatchesSrcAndCallDone(frameId)
-{
-    if (!window.testRunner)
-        return;
-
-    var actualURL = 'unavailable', frame = document.getElementById(frameId);
-    try {
-        actualURL = frame.contentWindow.location.href;
-    }
-    catch (e) {
-        actualURL = '[Location object access threw exception]';
-    }
-
-    if (actualURL != frame.src)
-        alert('URL mismatch: \'' + actualURL + '\' vs. \'' + frame.src + '\'');
-
-    testRunner.notifyDone();
-}
-
-function checkFrameIsCrossOriginAndCallDone(frameId) {
-    if (!window.testRunner)
-        return;
-
-    var actualURL = 'unavailable', frame = document.getElementById(frameId);
-    try {
-        actualURL = frame.contentWindow.location.href;
-        console.log('FAIL: "' + frameId + '" loaded "' + actualURL + '".');
-    }
-    catch (e) {
-        actualURL = '[Location object access threw exception]';
-        console.log('PASS: "' + frameId + '" is cross-origin.');
-    }
-
-    testRunner.notifyDone();
-}
-
-function sendRequestFromIFrame(url, params, HTTPMethod, callbackWhenDone)
-{
-    if (!params || !params.length)
-        return;
-        
-    if (!HTTPMethod)
-        HTTPMethod = 'GET';
-        
-    if (document.getElementById('frame'))
-        document.body.removeChild(document.getElementById('frame'));
-    var iFrameObj = document.createElement('iframe');
-    iFrameObj.name = 'frame';
-    document.body.appendChild(iFrameObj);
-    var frameContent = iFrameObj.contentDocument;
-    frameContent.open();
-    frameContent.write('<form method="' + HTTPMethod + '" name="form" id="form" action="' + url + '">');
-    if (params.length > 0) {
-        var paramArray = params.split('&');
-        for (var i = 0; i < paramArray.length; ++i) {
-            var paramElement = paramArray[i].split('=', 2);
-            frameContent.write('<input type="text" name="' + paramElement[0] + '" value="' + paramElement[1] + '">');
-        }   
-    }
-    frameContent.write('</form>');
-    frameContent.close();
-    if (callbackWhenDone)
-        iFrameObj.onload = callbackWhenDone;
-    frameContent.getElementById('form').submit();
-}
-
-
-function notifyDoneAfterReceivingLoaded()
-{
-    window.addEventListener("message", function(event) {
-        if (event.data == "loaded")
-            testRunner.notifyDone();
-    }, false);
-}
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss-filter-bypass-long-string-reply.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss-filter-bypass-long-string-reply.php
deleted file mode 100644
index 6aa23a6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss-filter-bypass-long-string-reply.php
+++ /dev/null
Binary files differ
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.js b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.js
deleted file mode 100644
index 6372476..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.js
+++ /dev/null
@@ -1 +0,0 @@
-alert(/XSS/);
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.php b/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.php
deleted file mode 100644
index e607166..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/resources/xss.php
+++ /dev/null
@@ -1,3 +0,0 @@
-<?php header("X-XSS-Protection: 1"); ?>
-<script>alert(/XSS/)</script>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-expected.txt
deleted file mode 100644
index 319d7bc..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=%3Cscript%20%89g%3Ealert(location)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode-expected.txt
deleted file mode 100644
index 09f94e3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?charset=Big5&q=%3Cscript%3Ealert(/XS%u00252581SS/)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode.html
deleted file mode 100644
index 97ef8e4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?charset=Big5&q=<script>alert(/XS%u00252581SS/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-expected.txt
deleted file mode 100644
index 21f5984..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=%3Cscript%3Ealert(/XS%2581SS/)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html
deleted file mode 100644
index 02c97dd..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=<script>alert(/XS%2581SS/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char.html
deleted file mode 100644
index da6150a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=<script%20%89g>alert(location)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2-expected.txt
deleted file mode 100644
index 16f637dd..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=%3Cscript%3Ealert(/XS%81SS/)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2.html
deleted file mode 100644
index c26e7d9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-Big5-char2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?charset=Big5&q=<script>alert(/XS%81SS/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash-expected.txt
deleted file mode 100644
index 0cf2753..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%5C/%3Balert%280%29%3B%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash.html
deleted file mode 100644
index 2c1ef6a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-backslash.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%5C/%3Balert%280%29%3B%3C/script%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote-expected.txt
deleted file mode 100644
index b7830d7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%22/%3Balert%280%29%3B%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote.html
deleted file mode 100644
index 5488ab2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-double-quote.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%22/%3Balert%280%29%3B%3C/script%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char-expected.txt
deleted file mode 100644
index dcb20f3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%00/%3Balert%280%29%3B%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char.html
deleted file mode 100644
index 800d923..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%00/%3Balert%280%29%3B%3C/script%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote-expected.txt
deleted file mode 100644
index 70a659b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%27/%3Balert%280%29%3B%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote.html
deleted file mode 100644
index d2aa3f4d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-addslashes-single-quote.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-addslashes.pl?q=%3Cscript%3Evar+bogus%3D/%27/%3Balert%280%29%3B%3C/script%3E">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char-expected.txt
deleted file mode 100644
index 63e990e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))//h%01%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char.html
deleted file mode 100644
index 8c7d6eda..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-control-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))//h%01</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted-expected.txt
deleted file mode 100644
index 98121f29..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Edocument.write(%22scri%22)%3C/script%3Ept%20src=%22xss.js%22%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted.html
deleted file mode 100644
index b224205..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-convoluted.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>document.write("scri")</script>pt src="xss.js"></script>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities-expected.txt
deleted file mode 100644
index 80d8766..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))//%26amp%3Bcopy%3B%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities.html
deleted file mode 100644
index 4e7104e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-entities.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))//%26amp%3Bcopy%3B</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expected.txt
deleted file mode 100644
index ed2f984a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscraaa%3E%3Cscriaa%3E%3Cscripa%3E%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt
deleted file mode 100644
index b4a8d49..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?script-expression-follows=1&q=%3Cscript%3Ealert(%27XSS%27)' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows.html
deleted file mode 100644
index 4885718..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-expression-follows.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?script-expression-follows=1&q=<script>alert('XSS')">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag-expected.txt
deleted file mode 100644
index ffab68f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Cscript%3E%2f%2f%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag.html
deleted file mode 100644
index 1649d61d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><script>%2f%2f%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))</script></svg>">
-</iframe>
-Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2-expected.txt
deleted file mode 100644
index a878ea04..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Cdiv%3E%3Ci%3Ex%3C/i%3E%3C/div%3E&q=%3Csvg%3E%3Cscript%3E%3C!--&q2=--%3E%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with <!-- comments -->.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2.html
deleted file mode 100644
index f024d5a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag2.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<div><i>x</i></div>&q=<svg><script><!--&q2=-->%26%23x0a%3balert%26%23x28%3bString.fromCharCode(0x58,0x53,0x53))</script></svg>">
-</iframe>
-Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with &lt;!-- comments --&gt;.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3-expected.txt
deleted file mode 100644
index 7f9f27d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Cscript%3Ealert(1)%3C/script%3E&q=%3Csvg%3E%3Cscript%3E&q2=alert(0)%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Cscript%3Ealert(1)%3C/script%3E&q=%3Csvg%3E%3Cscript%3E&q2=alert(0)%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with nested script blocks.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3.html
deleted file mode 100644
index 2f4d457..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag3.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<script>alert(1)</script>&q=<svg><script>&q2=alert(0)</script></svg>">
-</iframe>
-Ensures HTML entities are recognized in script blocks in a context where CDATA is allowed even with nested script blocks.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4-expected.txt
deleted file mode 100644
index 49db853..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Cscript%3E/%3C1/%3Ealert(0)%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE ERROR: line 4: Uncaught SyntaxError: Invalid regular expression: missing /
- Ensures regexps are handled in even with nested script blocks.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4.html
deleted file mode 100644
index fee5344..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag4.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><script>/<1/>alert(0)</script></svg>">
-</iframe>
-Ensures regexps are handled in even with nested script blocks.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5-expected.txt
deleted file mode 100644
index 6b22cf4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=blah&q=%3Csvg%3E%3Cscript%3Ealert(0)//&q2=%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Ensures script blocks in a context where CDATA is allowed respect JS comments.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5.html
deleted file mode 100644
index 58852c99..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag5.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=blah&q=<svg><script>alert(0)//&q2=</script></svg>">
-</iframe>
-Ensures script blocks in a context where CDATA is allowed respect JS comments.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6-expected.txt
deleted file mode 100644
index 509c6f9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=blah&q=%3Csvg%3E%3Cscript%3Ealert(0)%26%23x2f/&q2=%3C/script%3E%3C/svg%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
- Ensures script blocks in a context where CDATA is allowed respect JS comments encoded as entities.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6.html
deleted file mode 100644
index 4e1ef1b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-inside-svg-tag6.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=blah&q=<svg><script>alert(0)%26%23x2f/&q2=</script></svg>">
-</iframe>
-Ensures script blocks in a context where CDATA is allowed respect JS comments encoded as entities.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start-expected.txt
deleted file mode 100644
index 0e23be5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?script-expression-follows=1&q=%3Cscript%3E%22%3Cscript%3E%22-alert(/XSS/)' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start.html
deleted file mode 100644
index 2d3c3d7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-near-start.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?script-expression-follows=1&q=<script>%22<script>%22-alert(/XSS/)">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char-expected.txt
deleted file mode 100644
index e0efed8d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cp%3E%00%00%00%00%00%00%00%3Cscript%3Ealert(%27%00%27)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char.html
deleted file mode 100644
index c7c3d61..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<p>%00%00%00%00%00%00%00<script>alert('%00')</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect-expected.txt
deleted file mode 100644
index a7522ba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect.html
deleted file mode 100644
index 3cae550..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-open-redirect.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/redir.php?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char-expected.txt
deleted file mode 100644
index 9e1b3f26..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char.html
deleted file mode 100644
index 81eb839..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-control-char.html
+++ /dev/null
@@ -1,23 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe name="tg" src="about:blank"></iframe>
-<form target="tg" method="POST" id="theForm"
-  action="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl">
-<input type="hidden" name="notifyDone" value="1">
-<input type="text" name="q" value="<script>alert(XSS%05)</script>">
-</form>
-<script>
-document.getElementById('theForm').submit();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-expected.txt
deleted file mode 100644
index 9e1b3f26..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char-expected.txt
deleted file mode 100644
index 9e1b3f26..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char.html
deleted file mode 100644
index 69d0413..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-null-char.html
+++ /dev/null
@@ -1,23 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe name="tg" src="about:blank"></iframe>
-<form target="tg" method="POST" id="theForm"
-  action="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl">
-<input type="hidden" name="notifyDone" value="1">
-<input type="text" name="q" value="<script>al%00ert(0)</script>">
-</form>
-<script>
-document.getElementById('theForm').submit();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect-expected.txt
deleted file mode 100644
index 0692867..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: Uncaught ReferenceError: hunter is not defined
-Test for use of original post body in redirect. If the auditor fires, we've got a false positive from that.
-
- 
-
---------
-Frame: 'tg'
---------
-This is a page with a static script matching a post variable
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect.html
deleted file mode 100644
index 7075da8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post-redirect.html
+++ /dev/null
@@ -1,26 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.dumpChildFrames();
-  testRunner.setXSSAuditorEnabled(true);
-  testRunner.waitUntilDone();
-}
-</script>
-</head>
-<body>
-<p>Test for use of original post body in redirect.  If the auditor fires,
-we've got a false positive from that.</p>
-<iframe name="tg" src="about:blank"></iframe>
-<form target="tg" method="POST" id="theForm"
-  action="resources/redir.php?url=http://localhost:8000/security/xssAuditor/resources/static-script.php%3fdecoy=<script>">
-<input type="text" name="yourname" value="hunter"/>
-<input type="text" name="required for activation" value="&lt;&gt;"/>
-</form>
-<script>
-document.getElementById('theForm').submit();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post.html
deleted file mode 100644
index 70298c4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-post.html
+++ /dev/null
@@ -1,23 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe name="tg" src="about:blank"></iframe>
-<form target="tg" method="POST" id="theForm"
-  action="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl">
-<input type="hidden" name="notifyDone" value="1">
-<input type="text" name="q" value="<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</form>
-<script>
-document.getElementById('theForm').submit();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect-expected.txt
deleted file mode 100644
index a7522ba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect.html
deleted file mode 100644
index 3f097bb9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-redirect.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="resources/redir.php?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark-expected.txt
deleted file mode 100644
index 152e837..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(%22xxx%fexxx%22)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark.html
deleted file mode 100644
index b704bd1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-replaced-with-questionmark.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(%22xxx%fexxx%22)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe-expected.txt
deleted file mode 100644
index 8b13789..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe.html
deleted file mode 100644
index 1d3374d1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<script>0</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2-expected.txt
deleted file mode 100644
index e29af02..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: /This is a safe script./
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2.html
deleted file mode 100644
index 8f8e03f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/script-tag-safe2.php?q=alert(/This+is+a+safe+script./)'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3-expected.txt
deleted file mode 100644
index e29af02..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: /This is a safe script./
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3.html
deleted file mode 100644
index 4bf2bba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/script-tag-safe3.php?q=alert(/This+is+a+safe+script./)%3B'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4-expected.txt
deleted file mode 100644
index 52a4447..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4-expected.txt
+++ /dev/null
@@ -1 +0,0 @@
- Test passes if XSSAuditor is not triggered.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4.html
deleted file mode 100644
index 54d3a5e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-safe4.html
+++ /dev/null
@@ -1,16 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/script-tag-safe4-frame.php?q=<img%20src=%22http://127.0.0.1:8000/foo%22/>">
-</iframe>
-Test passes if XSSAuditor is not triggered.
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe.html
deleted file mode 100644
index fc2447f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-src-redirect-safe.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-script-src.pl?q=http://127.0.0.1:8000/security/xssAuditor/resources/safe-script.js">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-expected.txt
deleted file mode 100644
index 05a001e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%25u003c%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e%25u0061%25u006c%25u0065%25u0072%25u0074%25u0028%25u002f%25u0058%25u0053%25u0053%25u002f%25u0029%25u003c%25u002f%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair-expected.txt
deleted file mode 100644
index 49134b3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/XS%uD834%uDD1E/)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair.html
deleted file mode 100644
index a62508c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(/XS%uD834%uDD1E/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode.html
deleted file mode 100644
index ef49af1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%25u003c%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e%25u0061%25u006c%25u0065%25u0072%25u0074%25u0028%25u002f%25u0058%25u0053%25u0053%25u002f%25u0029%25u003c%25u002f%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2-expected.txt
deleted file mode 100644
index c612b55..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%3Cscript%3Ealert(/XS%u002525u0053/)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2.html
deleted file mode 100644
index cdf4740..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=<script>alert(/XS%u002525u0053/)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3-expected.txt
deleted file mode 100644
index d29a596..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%25u003c%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e%25u0061%25u006c%25u0065%25u0072%25u0074%25u0028%25u002f%25u0058%25u0053%25u0053%25u2620%25u002f%25u0029%25u003c%25u002f%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3.html
deleted file mode 100644
index 104b8b65..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%25u003c%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e%25u0061%25u006c%25u0065%25u0072%25u0074%25u0028%25u002f%25u0058%25u0053%25u0053%25u2620%25u002f%25u0029%25u003c%25u002f%25u0073%25u0063%25u0072%25u0069%25u0070%25u0074%25u003e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4-expected.txt
deleted file mode 100644
index 09d65ca..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=%3Cscript%3Ealert(%27%u0058%u0053%u0053%u0020%u05d0%u05d1%u05d8%u05d7%u05d4%u0020%u05e4%u05d2%u05d9%u05e2%u05d5%u05ea-%u8de8%u7ad9%u5f0f%u811a%u672c%u653b%u51fb%27)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4.html
deleted file mode 100644
index 9bbf62b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode4.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag-decode-16bit-unicode.pl?q=<script>alert('%u0058%u0053%u0053%u0020%u05d0%u05d1%u05d8%u05d7%u05d4%u0020%u05e4%u05d2%u05d9%u05e2%u05d5%u05ea-%u8de8%u7ad9%u5f0f%u811a%u672c%u653b%u51fb')</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5-expected.txt
deleted file mode 100644
index fb0de1c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(%27%u0058%u0053%u0053%u0020%u05d0%u05d1%u05d8%u05d7%u05d4%u0020%u05e4%u05d2%u05d9%u05e2%u05d5%u05ea-%u8de8%u7ad9%u5f0f%u811a%u672c%u653b%u51fb%27)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5.html
deleted file mode 100644
index 4614c8e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-16bit-unicode5.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert('%u0058%u0053%u0053%u0020%u05d0%u05d1%u05d8%u05d7%u05d4%u0020%u05e4%u05d2%u05d9%u05e2%u05d5%u05ea-%u8de8%u7ad9%u5f0f%u811a%u672c%u653b%u51fb')</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma-expected.txt
deleted file mode 100644
index 131392ea..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3E/**/0,0/*,*/-alert(0)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Test that the XSSAuditor's tolerance for the IIS webserver's comma concatenation doesn't open holes when the reflected argument contains an actual comma. The test passes if the XSSAuditor logs console messages and no alerts fire.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma.html
deleted file mode 100644
index c54578c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-actual-comma.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>/**/0,0/*,*/-alert(0)</script>">
-</iframe>
-<p>Test that the XSSAuditor's tolerance for the IIS webserver's comma concatenation doesn't open holes when the reflected argument
-contains an actual comma. The test passes if the XSSAuditor logs console messages and no alerts fire.</p>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks-expected.txt
deleted file mode 100644
index a7522ba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks.html
deleted file mode 100644
index 20add7d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-callbacks.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt
deleted file mode 100644
index f9d8931..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3Cscript%20x=%271&%3E&q2=1%27%3Ealert(String.fromCharCode(0x58,0x53,0x53,0x31))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by concatenating them before passing the result to the application. Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test passes if the XSSAuditor logs console messages and no alerts fire.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01.html
deleted file mode 100644
index 9cf8799..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-01.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=<script%20x='1&>&q2=1'>alert(String.fromCharCode(0x58,0x53,0x53,0x31))</script>"></iframe>
-    <p>Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by
-    concatenating them before passing the result to the application.  Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test
-    passes if the XSSAuditor logs console messages and no alerts fire.</p>
-</body>
-</html>
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02-expected.txt
deleted file mode 100644
index 611938a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=%3Cscript%3Ealert(String.fromCharCode(0x58&q2=0x53,0x53,0x32))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by concatenating them before passing the result to the application. Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test passes if the XSSAuditor logs console messages and no alerts fire.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02.html
deleted file mode 100644
index 1c4b4ae..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-comma-02.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=,&q=<script>alert(String.fromCharCode(0x58&q2=0x53,0x53,0x32))</script>"></iframe>
-    <p>Test that the XSSAuditor catches the specific case where the IIS webserver resovles multiply occuring query parameters by
-    concatenating them before passing the result to the application.  Conceptually, its as if ?a=1&a=2 becomes ?a=1,2. The test
-    passes if the XSSAuditor logs console messages and no alerts fire.</p>
-</body>
-</html>
-
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode-expected.txt
deleted file mode 100644
index 1d67009..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3E%u0061lert(0)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode.html
deleted file mode 100644
index cd7a2d8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-fancy-unicode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>%u0061lert(0)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment-expected.txt
deleted file mode 100644
index 694be42..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=/*]]%3E*/&q=%3Cscript%3E/*%3C!CDATA[*/alert(/XSS/)&q2=%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment.html
deleted file mode 100644
index 4da1df6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-comment.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=/*]]>*/&q=<script>/*<!CDATA[*/alert(/XSS/)&q2=</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string-expected.txt
deleted file mode 100644
index 8d3cc52..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=text%0a%3Cimg%3E%3E&q=%3Cscript%3Ealert(1)%2b`&q2=`%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string.html
deleted file mode 100644
index 6c6277e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-injected-template-string.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=text%0a<img>>&q=<script>alert(1)%2b`&q2=`</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag-expected.txt
deleted file mode 100644
index a118986..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20%3Ci%3E%3Cb%3E&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag.html
deleted file mode 100644
index 45abd28..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20<i><b>&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding-expected.txt
deleted file mode 100644
index 0926d76..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(1%1)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding.html
deleted file mode 100644
index 9188a45..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(1%1)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close-expected.txt
deleted file mode 100644
index ba4d549..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(1)%3C/script&clutter=%20' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close.html
deleted file mode 100644
index ee0468d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-partial-close.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(1)</script&clutter=%20">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char-expected.txt
deleted file mode 100644
index 4834056..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%27http://127.0.0.1:8000/sec%02urity/xssAuditor/resources/xss.js%27%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char.html
deleted file mode 100644
index 7a0caba..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-control-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='http://127.0.0.1:8000/sec%02urity/xssAuditor/resources/xss.js'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url-expected.txt
deleted file mode 100644
index 7bd2e2c0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%22data:,alert(1)%22' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url.html
deleted file mode 100644
index 53e2eb1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script%20src=%22data:,alert(1)%22">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2-expected.txt
deleted file mode 100644
index 8a0fcce..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Cb%3E***%3C/b%3E&q=%3Cscript%20src=%22data:,alert(1)//&q2=%22%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2.html
deleted file mode 100644
index 5455fbd7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url2.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<b>***</b>&q=<script%20src=%22data:,alert(1)//&q2=%22></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3-expected.txt
deleted file mode 100644
index dd549b3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Cb%3E***%3C/b%3E&q=%3Cscript%20src=%22data:,alert(1)%3C!----&q2=%22%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3.html
deleted file mode 100644
index de2cbac..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<b>***</b>&q=<script%20src=%22data:,alert(1)<!----&q2=%22></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4-expected.txt
deleted file mode 100644
index e41f6a3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%3E%3Cscript%20src%3ddata:,alert(1)%3bhey%%22' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4.html
deleted file mode 100644
index 0851981..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url4.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22><script src%3ddata:,alert(1)%3bhey%%22">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5-expected.txt
deleted file mode 100644
index 1dd4c04..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22%3E%3Cscript%20src%3ddata:%26comma%3balert(1)%3b%22' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5.html
deleted file mode 100644
index baf9ab2..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-data-url5.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-property.pl?q=%22><script src%3ddata:%26comma%3balert(1)%3b%22">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote-expected.txt
deleted file mode 100644
index 7fcc69c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%22%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote.html
deleted file mode 100644
index 851c4f7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-double-quote.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src="http://127.0.0.1:8000/security/xssAuditor/resources/xss.js"></script>'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities-expected.txt
deleted file mode 100644
index f6ddd4b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?%26amp%3Bcopy%3B%27%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities.html
deleted file mode 100644
index 9d2db41..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-entities.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?%26amp%3Bcopy%3B'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-expected.txt
deleted file mode 100644
index ce33b0d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%27http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%27%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host-expected.txt
deleted file mode 100644
index 8cd0f3e5..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=/xssAuditor/resources/xss.js%3e%3c/script%3e&q=%3cscript%20src=https:127.0.0.1:8443/security' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host.html
deleted file mode 100644
index 4b4254f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-implied-host.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=/xssAuditor/resources/xss.js%3e%3c/script%3e&q=%3cscript%20src=https:127.0.0.1:8443/security">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote-expected.txt
deleted file mode 100644
index 5924f44..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote.html
deleted file mode 100644
index 3a19786..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-no-quote.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src=http://127.0.0.1:8000/security/xssAuditor/resources/xss.js></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char-expected.txt
deleted file mode 100644
index bf64c6d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%27http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/xss.js%27%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char.html
deleted file mode 100644
index 95a9ffd..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-null-char.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='http://127.0.0.1:8000/sec%00urity/xssAuditor/resources/xss.js'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme-expected.txt
deleted file mode 100644
index 2af6410..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript+src%3D//127.0.0.1%3A8000/security/xssAuditor/resources/xss.js%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme.html
deleted file mode 100644
index 73c4215..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-relative-scheme.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript+src%3D//127.0.0.1%3A8000/security/xssAuditor/resources/xss.js%3E%3C/script%3E'>
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-expected.txt
deleted file mode 100644
index 0088a05e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-ALERT: This is a safe script.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query-expected.txt
deleted file mode 100644
index f853a18..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%27xss.js?maybe+dangerous+query+string%27%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query.html
deleted file mode 100644
index 37b03b3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='xss.js?maybe+dangerous+query+string'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host.html
deleted file mode 100644
index 624e0a7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-same-host.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='safe-script.js'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01-expected.txt
deleted file mode 100644
index 81f4218..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?&q2=%22%3E%3C/script%3E&clutter=blah' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01.html
deleted file mode 100644
index 91503b3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-01.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src="http://127.0.0.1:8000/security/xssAuditor/resources/xss.js?&q2="></script>&clutter=blah'></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02-expected.txt
deleted file mode 100644
index 073d898..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%23&q2=%22%3E%3C/script%3E&clutter=blah' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02.html
deleted file mode 100644
index 81bb1a7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-02.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src="http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%23&q2="></script>&clutter=blah'></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03-expected.txt
deleted file mode 100644
index 606fde7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%20src=%22http://127.0.0.1:8000/security/xssAuditor/resources/&q2=%22%3E%3C/script%3E&clutter=xss.js?' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03.html
deleted file mode 100644
index 13055bac..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source-unterminated-03.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src='http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src="http://127.0.0.1:8000/security/xssAuditor/resources/&q2="></script>&clutter=xss.js?'></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source.html
deleted file mode 100644
index 779e69c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-source.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script src='http://127.0.0.1:8000/security/xssAuditor/resources/xss.js'></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode-expected.txt
deleted file mode 100644
index 1ac3a20..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3E%252525u0061lert(0)%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode.html
deleted file mode 100644
index b28e301..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>%252525u0061lert(0)</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028-expected.txt
deleted file mode 100644
index 18d17d4..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3E//%e2%80%a8alert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028.html
deleted file mode 100644
index 3a697e7..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>//%e2%80%a8alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-expected.txt
deleted file mode 100644
index 4b3a767e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20%3Ci%3E%3Cb%3E&q=%3Cscript%3E/*&q2=*/alert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment.html
deleted file mode 100644
index fc8264b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20<i><b>&q=<script>/*&q2=*/alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2-expected.txt
deleted file mode 100644
index 422bec9..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Ci%3E%3Cb%3E&q=%3Cscript%3E//&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2.html
deleted file mode 100644
index c3dcd2f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment2.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<i><b>&q=<script>//&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))</script>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3-expected.txt
deleted file mode 100644
index c01b07e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 6: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20%3Ci%3E%3Cb%3E&q=%3Cscript%3E%20%0a%3C!--&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))//--%3E%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3.html
deleted file mode 100644
index f0d794d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment3.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%20<i><b>&q=<script>%20%0a<!--&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))//--></script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4-expected.txt
deleted file mode 100644
index 99b3f42..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3E/*///*/alert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4.html
deleted file mode 100644
index 20cf5ce..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment4.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>/*///*/alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5-expected.txt
deleted file mode 100644
index 6644e49..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 5: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Ci%3E%3Cb%3E&q=%3Cscript%3Ex=1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1//&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5.html
deleted file mode 100644
index 7364ad1..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment5.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<i><b>&q=<script>x=1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1*1//&q2=%0aalert(String.fromCharCode(0x58,0x53,0x53))</script>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6-expected.txt
deleted file mode 100644
index 4f5ab18..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 6: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=%3Ci%3E%3Cb%3E&q=%3Cscript%3Ealert(1)%0a--%3E&q2=y%3d2%0a%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6.html
deleted file mode 100644
index 8d0060c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-comment6.html
+++ /dev/null
@@ -1,14 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?clutter=<i><b>&q=<script>alert(1)%0a-->&q2=y%3d2%0a</script>"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode-expected.txt
deleted file mode 100644
index d4f1ee8..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)-1%2502%3Cscript%3C/script%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode.html
deleted file mode 100644
index 5c013b6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag-with-trailing-script-and-urlencode.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert(/xss/)-1%2502<script</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag.html
deleted file mode 100644
index 2552fe25..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/script-tag.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<scraaa><scriaa><scripa><script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute-expected.txt
deleted file mode 100644
index 2e6730f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 3: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-style-attr-value.pl?q=%22onload=%22alert(42)' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute.html
deleted file mode 100644
index 6ac8f06..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/style-attribute.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-style-attr-value.pl?q=%22onload=%22alert(42)">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2-expected.txt
deleted file mode 100644
index 92169645..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2-expected.txt
+++ /dev/null
@@ -1,11 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%20xmlns:xlink=%27http://www.w3.org/1999/xlink%27%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=xlink:href%20values=javascript%3Aalert(1)%3B%3B&clutter=blah%27%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-animate => animate
-* attributeName: xlink:href
-* values: javascript:void(0)
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2.html
deleted file mode 100644
index a144685..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-2.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.dumpChildFrames();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <p>This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.</p>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg%20xmlns:xlink='http://www.w3.org/1999/xlink'><a><circle%20r=100%20/><animate%20attributeName=xlink:href%20values=javascript%3Aalert(1)%3B%3B&clutter=blah'>&notifyDone=1&dumpElementBySelector=animate"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-expected.txt
deleted file mode 100644
index cea8369..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter-expected.txt
+++ /dev/null
@@ -1,11 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%20xmlns:xlink=%27http://www.w3.org/1999/xlink%27%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=xlink:href%20values=%3Bjavascript%3Aalert(1)%3B&clutter=blah%27%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-animate => animate
-* attributeName: xlink:href
-* values: javascript:void(0)
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter.html
deleted file mode 100644
index d4f31f54..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-clutter.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.dumpChildFrames();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <p>This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.</p>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg%20xmlns:xlink='http://www.w3.org/1999/xlink'><a><circle%20r=100%20/><animate%20attributeName=xlink:href%20values=%3Bjavascript%3Aalert(1)%3B&clutter=blah'>&notifyDone=1&dumpElementBySelector=animate"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-expected.txt
deleted file mode 100644
index 8960f0e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-expected.txt
+++ /dev/null
@@ -1,14 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%20xmlns:xlink=%27http://www.w3.org/1999/xlink%27%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=xlink:href%20values=%3Bjavascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/%3E%3C/a%3E%3C/svg%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-animate => animate
-* attributeName: xlink:href
-* values: javascript:void(0)
-* begin: 0s
-* end: 0.1s
-* fill: freeze
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
deleted file mode 100644
index 978946f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href-expected.txt
+++ /dev/null
@@ -1,14 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Csvg%3E%3Ca%3E%3Ccircle%20r=100%20/%3E%3Canimate%20attributeName=href%20values=%3Bj%26%23x61%3Bvascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/%3E%3C/a%3E%3C/svg%3E&notifyDone=1&dumpElementBySelector=animate' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.
-
---------
-Frame: '<!--framePath //<!--frame0-->-->'
---------
-animate => animate
-* attributeName: href
-* values: javascript:void(0)
-* begin: 0s
-* end: 0.1s
-* fill: freeze
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href.html
deleted file mode 100644
index 90c569c..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate-href.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.dumpChildFrames();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <p>This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.</p>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg><a><circle%20r=100%20/><animate%20attributeName=href%20values=%3Bj%26%23x61%3Bvascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/></a></svg>&notifyDone=1&dumpElementBySelector=animate"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate.html
deleted file mode 100644
index 9b36cbb..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-animate.html
+++ /dev/null
@@ -1,17 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-    <script>
-        if (window.testRunner) {
-            testRunner.dumpAsText();
-            testRunner.dumpChildFrames();
-            testRunner.waitUntilDone();
-            testRunner.setXSSAuditorEnabled(true);
-        }
-    </script>
-</head>
-<body>
-    <p>This test passes if the element displayed in the frame below has a 'values' attribute containing only 'javascript:void(0)'.</p>
-    <iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<svg%20xmlns:xlink='http://www.w3.org/1999/xlink'><a><circle%20r=100%20/><animate%20attributeName=xlink:href%20values=%3Bjavascript%3Aalert(1)%20begin=0s%20end=0.1s%20fill=freeze%20/></a></svg>&notifyDone=1&dumpElementBySelector=animate"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-expected.txt
deleted file mode 100644
index b3be73a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3csvg%3e%3cscript%20XLinK:href=%27data:text/html,alert(0)%27%3e%3c/script%3e%3c/svg%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href-expected.txt
deleted file mode 100644
index 7ce9036..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3csvg%3e%3cscript%20href=%27data:text/html,alert(0)%27%3e%3c/script%3e%3c/svg%3e' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href.html
deleted file mode 100644
index 6cbfdc0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag-href.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3csvg%3e%3cscript%20href='data:text/html,alert(0)'%3e%3c/script%3e%3c/svg%3e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag.html
deleted file mode 100644
index 301704dd..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/svg-script-tag.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3csvg%3e%3cscript%20XLinK:href='data:text/html,alert(0)'%3e%3c/script%3e%3c/svg%3e">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover-expected.txt
deleted file mode 100644
index 3c1d9525..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover-expected.txt
+++ /dev/null
@@ -1,22 +0,0 @@
-<!DOCTYPE html><html><head></head><body><iframe id="x" name="x" src="/security/xssAuditor/resources/echo-intertag.pl?q=%3cdiv%20onmouseover=%22alert(/xss/)%22%%3e%3c/div%3e"></iframe>
-<script>
-var frame = document.getElementById('x');
-if (window.testRunner) {
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.dumpAsMarkup();
-    testRunner.dumpChildFrames();
-    testRunner.setViewSourceForFrame('x', true);
-    frame.onload = testRunner.notifyDone.bind(testRunner);
-}
-frame.src = '/security/xssAuditor/resources/echo-intertag.pl?q=%3cdiv%20onmouseover=%22alert(/xss/)%22%%3e%3c/div%3e';
-</script>
-<p>This test passes if the iframe is rendered in view-source mode and the div with the
-onmouseover handler is in a highlighted span.</p>
-
-</body></html>
-
---------
-Frame: 'x'
---------
-<html><head></head><body><div class="line-gutter-backdrop"></div><table><tbody><tr><td class="line-number" value="1"></td><td class="line-content"><span class="html-doctype">&lt;!DOCTYPE html&gt;</span></td></tr><tr><td class="line-number" value="2"></td><td class="line-content"><span class="html-tag">&lt;html&gt;</span></td></tr><tr><td class="line-number" value="3"></td><td class="line-content"><span class="html-tag">&lt;body&gt;</span></td></tr><tr><td class="line-number" value="4"></td><td class="line-content"><span class="highlight" title="Token contains a reflected XSS vector"><span class="html-tag">&lt;div <span class="html-attribute-name">onmouseover</span>="<span class="html-attribute-value">alert(/xss/)</span>"<span class="html-attribute-name">%</span>&gt;</span></span><span class="html-tag">&lt;/div&gt;</span>Page rendered here.</td></tr><tr><td class="line-number" value="5"></td><td class="line-content"><span class="html-tag">&lt;/body&gt;</span></td></tr><tr><td class="line-number" value="6"></td><td class="line-content"><span class="html-tag">&lt;/html&gt;</span></td></tr><tr><td class="line-number" value="7"></td><td class="line-content"><span class="html-end-of-file"></span></td></tr></tbody></table></body></html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover.html
deleted file mode 100644
index 699c685e..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-onmouseover.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<iframe id="x" name="x"></iframe>
-<script>
-var frame = document.getElementById('x');
-if (window.testRunner) {
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.dumpAsMarkup();
-    testRunner.dumpChildFrames();
-    testRunner.setViewSourceForFrame('x', true);
-    frame.onload = testRunner.notifyDone.bind(testRunner);
-}
-frame.src = '/security/xssAuditor/resources/echo-intertag.pl?q=%3cdiv%20onmouseover=%22alert(/xss/)%22%%3e%3c/div%3e';
-</script>
-<p>This test passes if the iframe is rendered in view-source mode and the div with the
-onmouseover handler is in a highlighted span.</p>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag-expected.txt
deleted file mode 100644
index 803aee87..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag-expected.txt
+++ /dev/null
@@ -1,22 +0,0 @@
-<!DOCTYPE html><html><head></head><body><iframe id="x" name="x" src="/security/xssAuditor/resources/echo-intertag.pl?q=%3cscript%3ealert(/xss/)%3c/script%3e"></iframe>
-<script>
-var frame = document.getElementById('x');
-if (window.testRunner) {
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.dumpAsMarkup();
-    testRunner.dumpChildFrames();
-    testRunner.setViewSourceForFrame('x', true);
-    frame.onload = testRunner.notifyDone.bind(testRunner);
-}
-frame.src = '/security/xssAuditor/resources/echo-intertag.pl?q=%3cscript%3ealert(/xss/)%3c/script%3e';
-</script>
-<p>This test passes if the iframe is rendered in view-source mode such that script doesn't execute and
-instead the "alert(/xss/)" is in a highlighted span.</p>
-
-</body></html>
-
---------
-Frame: 'x'
---------
-<html><head></head><body><div class="line-gutter-backdrop"></div><table><tbody><tr><td class="line-number" value="1"></td><td class="line-content"><span class="html-doctype">&lt;!DOCTYPE html&gt;</span></td></tr><tr><td class="line-number" value="2"></td><td class="line-content"><span class="html-tag">&lt;html&gt;</span></td></tr><tr><td class="line-number" value="3"></td><td class="line-content"><span class="html-tag">&lt;body&gt;</span></td></tr><tr><td class="line-number" value="4"></td><td class="line-content"><span class="html-tag">&lt;script&gt;</span><span class="highlight" title="Token contains a reflected XSS vector">alert(/xss/)</span><span class="html-tag">&lt;/script&gt;</span>Page rendered here.</td></tr><tr><td class="line-number" value="5"></td><td class="line-content"><span class="html-tag">&lt;/body&gt;</span></td></tr><tr><td class="line-number" value="6"></td><td class="line-content"><span class="html-tag">&lt;/html&gt;</span></td></tr><tr><td class="line-number" value="7"></td><td class="line-content"><span class="html-end-of-file"></span></td></tr></tbody></table></body></html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag.html
deleted file mode 100644
index d6a8df6..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/viewsource-script-tag.html
+++ /dev/null
@@ -1,18 +0,0 @@
-<!DOCTYPE html>
-<html>
-<iframe id="x" name="x"></iframe>
-<script>
-var frame = document.getElementById('x');
-if (window.testRunner) {
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.dumpAsMarkup();
-    testRunner.dumpChildFrames();
-    testRunner.setViewSourceForFrame('x', true);
-    frame.onload = testRunner.notifyDone.bind(testRunner);
-}
-frame.src = '/security/xssAuditor/resources/echo-intertag.pl?q=%3cscript%3ealert(/xss/)%3c/script%3e';
-</script>
-<p>This test passes if the iframe is rendered in view-source mode such that script doesn't execute and
-instead the "alert(/xss/)" is in a highlighted span.</p>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert-expected.txt
deleted file mode 100644
index 9296517..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert-expected.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-This test PASSED if we don't trigger an assertion failure when opening a pop-up window without a URL. To run this test by hand, ensure that pop-up windows aren't blocked before loading this page.
-
-PASSED
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert.html
deleted file mode 100644
index 67db8ad..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/window-open-without-url-should-not-assert.html
+++ /dev/null
@@ -1,44 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.setXSSAuditorEnabled(true);
-    testRunner.setCanOpenWindows();
-    testRunner.setCloseRemainingWindowsWhenComplete(true);
-    testRunner.waitUntilDone();
-}
-</script>
-</head>
-<body>
-<p>This test PASSED if we don't trigger an assertion failure when opening a pop-up window without a URL. To run this test by hand, ensure that pop-up windows aren't blocked before loading this page.</p>
-<pre id="console"></pre>
-<script>
-function finish()
-{
-    document.getElementById("console").innerText = "PASSED";
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-
-function runTest()
-{
-    var childWindow = window.open("");
-    if (!childWindow) {
-        document.getElementById("console").innerText = "FAILED to open pop-up window. Ensure that pop-up windows aren't blocked.";
-        return;
-    }
-
-    childWindow.document.open();
-    childWindow.document.write("PASSED");
-
-    <!-- Break up the HTML Script Element so it is not interpreted by HTML4 parsers as per <http://www.w3.org/TR/html4/types.html#type-cdata>. -->
-    childWindow.document.write("<scr" + "ipt>window.opener.finish()<" + "/script>");
-
-    childWindow.document.close();
-}
-runTest();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5-expected.txt
deleted file mode 100644
index 26247792..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(%27%b4%5f%27)%3C/script%3E&charset=big5&notifyDone=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5.html
deleted file mode 100644
index 19516a0..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-big5.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert('%b4%5f')</script>&charset=big5&notifyDone=1"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string-expected.txt
deleted file mode 100644
index f28c9e15..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 79: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/xss-filter-bypass-long-string-reply.php' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string.html
deleted file mode 100644
index 459c6e3..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-long-string.html
+++ /dev/null
@@ -1,107 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-  testRunner.dumpAsText();
-  testRunner.waitUntilDone();
-  testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe name="tg" src="about:blank"></iframe>
-<form target="tg" method="POST" id="theForm"
-  action="http://localhost:8000/security/xssAuditor/resources/xss-filter-bypass-long-string-reply.php">
-<input type="hidden" name="post_data0"  value="" />
-<input type="hidden" name="post_data1"  value="" />
-<input type="hidden" name="post_data2"  value="" />
-<input type="hidden" name="post_data3"  value="" />
-<input type="hidden" name="post_data4"  value="" />
-<input type="hidden" name="post_data5"  value="" />
-<input type="hidden" name="post_data6"  value="" />
-<input type="hidden" name="post_data7"  value="" />
-<input type="hidden" name="post_data8"  value="" />
-<input type="hidden" name="post_data9"  value="" />
-<input type="hidden" name="post_data10" value="" />
-<input type="hidden" name="post_data11" value="" />
-<input type="hidden" name="post_data12" value="" />
-<input type="hidden" name="post_data13" value="" />
-<input type="hidden" name="post_data14" value="" />
-<input type="hidden" name="post_data15" value="" />
-<input type="hidden" name="post_data16" value="" />
-<input type="hidden" name="post_data17" value="" />
-<input type="hidden" name="post_data18" value="" />
-<input type="hidden" name="post_data19" value="" />
-<input type="hidden" name="post_data20" value="" />
-<input type="hidden" name="post_data21" value="" />
-<input type="hidden" name="post_data22" value="" />
-<input type="hidden" name="post_data23" value="" />
-<input type="hidden" name="post_data24" value="" />
-<input type="hidden" name="post_data25" value="" />
-<input type="hidden" name="post_data26" value="" />
-<input type="hidden" name="post_data27" value="" />
-<input type="hidden" name="post_data28" value="" />
-<input type="hidden" name="post_data29" value="" />
-<input type="hidden" name="post_data30" value="" />
-<input type="hidden" name="post_data31" value="" />
-<input type="hidden" name="post_data32" value="" />
-<input type="hidden" name="post_data33" value="" />
-<input type="hidden" name="post_data34" value="" />
-<input type="hidden" name="post_data35" value="" />
-<input type="hidden" name="post_data36" value="" />
-<input type="hidden" name="post_data37" value="" />
-<input type="hidden" name="post_data38" value="" />
-<input type="hidden" name="post_data39" value="" />
-<input type="hidden" name="post_data40" value="" />
-<input type="hidden" name="post_data41" value="" />
-<input type="hidden" name="post_data42" value="" />
-<input type="hidden" name="post_data43" value="" />
-<input type="hidden" name="post_data44" value="" />
-<input type="hidden" name="post_data45" value="" />
-<input type="hidden" name="post_data46" value="" />
-<input type="hidden" name="post_data47" value="" />
-<input type="hidden" name="post_data48" value="" />
-<input type="hidden" name="post_data49" value="" />
-<input type="hidden" name="post_data50" value="" />
-<input type="hidden" name="post_data51" value="" />
-<input type="hidden" name="post_data52" value="" />
-<input type="hidden" name="post_data53" value="" />
-<input type="hidden" name="post_data54" value="" />
-<input type="hidden" name="post_data55" value="" />
-<input type="hidden" name="post_data56" value="" />
-<input type="hidden" name="post_data57" value="" />
-<input type="hidden" name="post_data58" value="" />
-<input type="hidden" name="post_data59" value="" />
-<input type="hidden" name="post_data60" value="" />
-<input type="hidden" name="post_data61" value="" />
-<input type="hidden" name="post_data62" value="" />
-<input type="hidden" name="post_data63" value="" />
-<input type="hidden" name="post_data64" value="" />
-<input type="hidden" name="post_data65" value="" />
-<input type="hidden" name="post_data66" value="" />
-<input type="hidden" name="post_data67" value="" />
-<input type="hidden" name="post_data68" value="" />
-<input type="hidden" name="post_data69" value="" />
-<input type="hidden" name="post_data70" value="" />
-<input type="hidden" name="post_data71" value="" />
-<input type="hidden" name="post_data72" value="" />
-<input type="hidden" name="post_data73" value="" />
-<input type="hidden" name="post_data74" value="" />
-<input type="hidden" name="post_data75" value="" />
-<input type="hidden" name="post_data76" value="" />
-<input type="hidden" name="post_data77" value="" />
-<input type="hidden" name="post_data78" value="" />
-<input type="hidden" name="post_data79" value="" />
-<input type="hidden" name="post_data80" value="" />
-<input type="hidden" name="post_data81" value="" />
-<input type="hidden" name="post_data82" value="" />
-<input type="hidden" name="post_data83" value="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" />
-<input type="hidden" name="post_data84" value="&lt;a&gt;&#00;&#00;" />
-<input type="hidden" name="post_data85" value="&lt;script&gt;alert('Hello World')&lt;/script&gt;&lt;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa&gt;" />
-</form>
-<script>
-document.getElementById('theForm').submit();
-</script>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis-expected.txt
deleted file mode 100644
index 2a5747d..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis-expected.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(%27%8f%5f%27)%3C/script%3E&charset=shift_jis&notifyDone=1' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis.html
deleted file mode 100644
index 7082a8b..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-filter-bypass-sjis.html
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=<script>alert('%8f%5f')</script>&charset=shift_jis&notifyDone=1"></iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01-expected.txt
deleted file mode 100644
index 4889a8a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01-expected.txt
+++ /dev/null
@@ -1,8 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01.html
deleted file mode 100644
index 80cb24a..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-01.html
+++ /dev/null
@@ -1,25 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-function done()
-{
-    if (window.testRunner)
-        testRunner.notifyDone();
-}
-window.onload = function()
-{
-    sendRequestFromIFrame("http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl","valid-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<\/script>","POST", done);
-};
-</script>
-</head>
-<body>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02-expected.txt
deleted file mode 100644
index ee87851..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=2&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon. Although theoretically malformed, we tolerate this case without issuing an error.
-
---------
-Frame: 'frame'
---------
-If you see this message and no JavaScript alert() then the test PASSED.
-
-Page rendered here.
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02.html
deleted file mode 100644
index f9da37f..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-02.html
+++ /dev/null
@@ -1,20 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon.
-Although theoretically malformed, we tolerate this case without issuing an error. </p>
-<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=2&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03-expected.txt
deleted file mode 100644
index 4b45864..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=3&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon following mode=blank. Although theoretically malformed, we tolerate this case without issuing an error.
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03.html
deleted file mode 100644
index e2279db..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-03.html
+++ /dev/null
@@ -1,20 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon following mode=blank.
-Although theoretically malformed, we tolerate this case without issuing an error. </p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
-</iframe>
-</body>
-</html>
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04-expected.txt b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04-expected.txt
deleted file mode 100644
index 695e8322..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04-expected.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=4&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message%20and%20no%20JavaScript%20alert()%20then%20the%20test%20PASSED.%3C/p%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
-CONSOLE MESSAGE: line 31: PASS: "frame" is cross-origin.
-This tests that the X-XSS-Protection header is not ignored when the report and mode directives are swapped.
-
---------
-Frame: 'frame'
---------
-Could not load the requested resource.
-Error code: -28 (net::ERR_BLOCKED_BY_XSS_AUDITOR)
diff --git a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04.html b/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04.html
deleted file mode 100644
index ce2ef04..0000000
--- a/third_party/blink/web_tests/http/tests/security/xssAuditor/xss-protection-parsing-04.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="http://localhost:8000/security/xssAuditor/resources/utilities.js"></script>
-<script>
-if (window.testRunner) {
-    testRunner.dumpAsText();
-    testRunner.dumpChildFrames();
-    testRunner.waitUntilDone();
-    testRunner.setXSSAuditorEnabled(true);
-}
-</script>
-</head>
-<body>
-<p>This tests that the X-XSS-Protection header is not ignored when the report and mode directives are swapped.</p>
-<iframe id="frame" name="frame" onload="checkFrameIsCrossOriginAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&valid-header=4&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
-</iframe>
-</body>
-</html>