OLD | NEW |
1 <html> | 1 <html> |
2 <body> | 2 <body> |
3 <script> | 3 <script> |
4 if (window.testRunner) | 4 if (window.testRunner) { |
5 testRunner.dumpAsText(); | 5 testRunner.dumpAsText(); |
| 6 testRunner.overridePreference("WebKitAllowRunningInsecureContent", true); |
| 7 } |
6 </script> | 8 </script> |
7 <p>This test loads a secure iframe that loads an insecure style sheet. | 9 <p>This test loads a secure iframe that loads an insecure style sheet. |
8 We should trigger a mixed content callback because an active network attacker | 10 We should trigger a mixed content callback because an active network attacker |
9 can use CSS3 to breach the confidentiality of the HTTPS security origin.</p> | 11 can use CSS3 to breach the confidentiality of the HTTPS security origin.</p> |
10 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-css.html"; | 12 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-css.html"; |
11 ></iframe> | 13 ></iframe> |
12 </body> | 14 </body> |
13 </html> | 15 </html> |
OLD | NEW |