| Index: LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| diff --git a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt b/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| deleted file mode 100644
|
| index 3586c9c12842299d486d38e8e702210ad65f4abc..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/http/tests/security/aboutBlank/xss-DENIED-set-opener-expected.txt
|
| +++ /dev/null
|
| @@ -1,20 +0,0 @@
|
| -CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
|
| -CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
|
| -CONSOLE MESSAGE: line 1: TypeError: 'undefined' is not an object (evaluating 'target.document.body')
|
| -This page opens a window to "", injects malicious code, and then uses window.open.call to set its opener to the victim. The opened window then tries to scripts its opener.
|
| -Code injected into window:
|
| -<script>function write(target, message) { target.document.body.innerHTML = message; }
|
| -setTimeout(function() {write(window.opener.top.frames[0], 'FAIL: XSS was allowed.');}, 100);
|
| -setTimeout(function() {write(window.opener.top.frames[1], 'SUCCESS: Window remained in original SecurityOrigin.');}, 200);
|
| -setTimeout(function() { if (window.testRunner) testRunner.globalFlag = true; }, 300);</script>
|
| -
|
| -
|
| ---------
|
| -Frame: '<!--framePath //<!--frame0-->-->'
|
| ---------
|
| -This page doesn't do anything special.
|
| -
|
| ---------
|
| -Frame: '<!--framePath //<!--frame1-->-->'
|
| ---------
|
| -SUCCESS: Window remained in original SecurityOrigin.
|
|
|