| Index: LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
 | 
| diff --git a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
 | 
| index baf774116ae9aa6383979cccccee578cab6d9b50..882ee9f51479060b958f883937135846f8b5829c 100644
 | 
| --- a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
 | 
| +++ b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
 | 
| @@ -13,7 +13,7 @@ if (window.testRunner) {
 | 
|  </head>
 | 
|  <body>
 | 
|  <p>This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds <a href="https://bugs.webkit.org/show_bug.cgi?id=27312#c13">16 characters, and that an error is reported.</a></p>
 | 
| -<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
 | 
| +<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
 | 
|  </iframe>
 | 
|  </body>
 | 
|  </html>
 | 
| 
 |