Index: LayoutTests/http/tests/security/mixedContent/insecure-image-in-iframe.html |
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-iframe.html b/LayoutTests/http/tests/security/mixedContent/insecure-image-in-iframe.html |
index f7d3c1fafc0512d7e077fd1ea6f8081f95668257..f9d77299912de266063f32aea52ce92a436e826f 100644 |
--- a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-iframe.html |
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-image-in-iframe.html |
@@ -5,8 +5,7 @@ if (window.testRunner) |
testRunner.dumpAsText(); |
</script> |
<p>This test loads a secure iframe that loads an insecure image. We should |
-*not* get a mixed content callback becase the main frame is HTTP and the image |
-doesn't contaminate the child iframe's security origin with mixed content.</p> |
+get a mixed content callback becase the frame is HTTPS and the image is not.</p> |
<iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image.html"; |
></iframe> |
</body> |