| Index: LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
|
| index 882ee9f51479060b958f883937135846f8b5829c..baf774116ae9aa6383979cccccee578cab6d9b50 100644
|
| --- a/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html
|
| @@ -13,7 +13,7 @@ if (window.testRunner) {
|
| </head>
|
| <body>
|
| <p>This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds <a href="https://bugs.webkit.org/show_bug.cgi?id=27312#c13">16 characters, and that an error is reported.</a></p>
|
| -<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
|
| +<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
|
| </iframe>
|
| </body>
|
| </html>
|
|
|