| Index: LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php | 
| diff --git a/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php b/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php | 
| new file mode 100644 | 
| index 0000000000000000000000000000000000000000..aaa2eecd3f22bf2917cac75b74511d1a656b1f3c | 
| --- /dev/null | 
| +++ b/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php | 
| @@ -0,0 +1,26 @@ | 
| +<?php | 
| +header("Content-Security-Policy: suborigin foobar"); | 
| +?> | 
| +<!DOCTYPE html> | 
| +<html> | 
| +<head> | 
| +<title>Allow suborigin in HTTP header</title> | 
| +<script src="/resources/testharness.js"></script> | 
| +<script src="/resources/testharnessreport.js"></script> | 
| +</head> | 
| +<script> | 
| +window.onmessage = function() { | 
| +    var iframe = document.getElementById('iframe'); | 
| +    var secret = ''; | 
| +    try { | 
| +        secret = iframe.contentWindow.secret; | 
| +        assert_equals(secret, "I am a secret", "The parent frame should be able to get the secret value from the child iframe."); | 
| +        done(); | 
| +    } catch(e) { | 
| +        assert_unreached(); | 
| +        done(); | 
| +    }; | 
| +}; | 
| +</script> | 
| +<iframe id="iframe" src="resources/childsuborigin.php?suborigin=foobar"></iframe> | 
| +</html> | 
|  |