Index: LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html |
diff --git a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html |
index baf774116ae9aa6383979cccccee578cab6d9b50..882ee9f51479060b958f883937135846f8b5829c 100644 |
--- a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html |
+++ b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html |
@@ -13,7 +13,7 @@ if (window.testRunner) { |
</head> |
<body> |
<p>This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds <a href="https://bugs.webkit.org/show_bug.cgi?id=27312#c13">16 characters, and that an error is reported.</a></p> |
-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>"> |
+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>"> |
</iframe> |
</body> |
</html> |