Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | <!DOCTYPE html> |
michael@0 | 2 | <html class="reftest-wait"> |
michael@0 | 3 | <head> |
michael@0 | 4 | <meta charset="UTF-8"> |
michael@0 | 5 | <script> |
michael@0 | 6 | |
michael@0 | 7 | function f() |
michael@0 | 8 | { |
michael@0 | 9 | function spin() { |
michael@0 | 10 | for (var i = 0; i < 8; ++i) { |
michael@0 | 11 | var x = new XMLHttpRequest(); |
michael@0 | 12 | x.open('GET', 'data:text/html,' + i, false); |
michael@0 | 13 | x.send(); |
michael@0 | 14 | } |
michael@0 | 15 | } |
michael@0 | 16 | |
michael@0 | 17 | window.addEventListener("popstate", spin, false); |
michael@0 | 18 | window.close(); |
michael@0 | 19 | window.location = "#c"; |
michael@0 | 20 | finish(); |
michael@0 | 21 | } |
michael@0 | 22 | |
michael@0 | 23 | function start() |
michael@0 | 24 | { |
michael@0 | 25 | var html = "<script>" + f + "<\/script><body onload=f()>"; |
michael@0 | 26 | var win = window.open("data:text/html," + encodeURIComponent(html), null, "width=300,height=300"); |
michael@0 | 27 | win.finish = function() { document.documentElement.removeAttribute("class"); }; |
michael@0 | 28 | } |
michael@0 | 29 | |
michael@0 | 30 | </script> |
michael@0 | 31 | </head> |
michael@0 | 32 | <body onload="start();"></body> |
michael@0 | 33 | </html> |