| Index: LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html
|
| index 5d31bf18ed793e9cb064aa7a1d8f6a22e5a05648..aa2d59e56520ab1edb65d7a4814c214d20c85991 100644
|
| --- a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html
|
| @@ -13,7 +13,7 @@ if (window.testRunner) {
|
| </head>
|
| <body>
|
| <p>This tests that a malformed X-XSS-Protection header is not ignored and an error is reported when the mode= token is invalid.</p>
|
| -<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
|
| +<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
|
| </iframe>
|
| </body>
|
| </html>
|
|
|