X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fthird_party%2FWebKit%2FLayoutTests%2Fhttp%2Ftests%2Fsecurity%2FmixedContent%2Fredirect-https-to-http-script-in-iframe-expected.txt;h=016fc0732cf37715bc09729676ba58eef767e7c8;hb=3545e9f2671f595d2a2f3ee75ca0393b01e35ef6;hp=eb7f6158ab3c7d11f0c124afcd62be32c4c20828;hpb=7d210d4c7e9ba36e635eabc5b5780495f8a63292;p=platform%2Fframework%2Fweb%2Fcrosswalk.git diff --git a/src/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-script-in-iframe-expected.txt b/src/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-script-in-iframe-expected.txt index eb7f615..016fc07 100644 --- a/src/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-script-in-iframe-expected.txt +++ b/src/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-script-in-iframe-expected.txt @@ -1,5 +1,3 @@ -CONSOLE WARNING: The page at 'https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html' was loaded over HTTPS, but ran insecure content from 'http://127.0.0.1:8080/security/mixedContent/resources/script.js': this content should also be loaded over HTTPS. - This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker can end up controling the script.