| Index: LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-ignore-unsafeinline.html
 | 
| diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-ignore-unsafeinline.html
 | 
| similarity index 56%
 | 
| copy from LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-allowed.html
 | 
| copy to LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-ignore-unsafeinline.html
 | 
| index 10fedea8f4d596130c9f0f394d2eb7b32576402f..709ba205b468056ec0b812fca514e4e1194c7ad0 100644
 | 
| --- a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-allowed.html
 | 
| +++ b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-ignore-unsafeinline.html
 | 
| @@ -1,17 +1,19 @@
 | 
|  <!DOCTYPE html>
 | 
|  <html>
 | 
|      <head>
 | 
| -        <meta http-equiv="Content-Security-Policy" content="script-src 'sha1-Au4uYFbkf7OYd+ACMnKq96FN3qo='">
 | 
| +        <meta http-equiv="Content-Security-Policy" content="script-src 'sha1-Au4uYFbkf7OYd+ACMnKq96FN3qo=' 'unsafe-inline'">
 | 
|          <script>
 | 
|              if (window.testRunner)
 | 
|                  testRunner.dumpAsText();
 | 
|              alert('PASS (1/1)');
 | 
|          </script>
 | 
| +        <script>
 | 
| +            alert('FAIL (1/1)');
 | 
| +        </script>
 | 
|      </head>
 | 
|      <body>
 | 
|          <p>
 | 
| -            This tests the effect of a valid script-hash value. It passes if no
 | 
| -            console warning is visible, and the alert() is executed.
 | 
| +            This tests that a valid hash value disables inline JavaScript, even if 'unsafe-inline' is present.
 | 
|          </p>
 | 
|      </body>
 | 
|  </html>
 | 
| 
 |