Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(349)

Side by Side Diff: LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt

Issue 19551006: Re-instantiate the mixed iframe block for M30. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 CONSOLE MESSAGE: line 8: The page at https://127.0.0.1:8443/security/mixedConten t/resources/frame-with-redirect-http-to-https-frame.html displayed insecure cont ent from http://127.0.0.1:8080/security/resources/redir.php?url=https://127.0.0. 1:8443/security/mixedContent/resources/boring.html. 1 CONSOLE MESSAGE: line 8: The page at https://127.0.0.1:8443/security/mixedConten t/resources/frame-with-redirect-http-to-https-frame.html ran insecure content fr om http://127.0.0.1:8080/security/resources/redir.php?url=https://127.0.0.1:8443 /security/mixedContent/resources/boring.html.
2 2
3 This test opens a window that loads an insecure iframe (via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is running content that can be controlled by an active network atta cker. 3 This test opens a window that loads an insecure iframe (via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is running content that can be controlled by an active network atta cker.
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698