Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml" class="reftest-wait">
2 <head>
4 <bindings xmlns="http://www.mozilla.org/xbl"><binding id="empty"><content></content></binding></bindings>
6 <style>
8 .bef:before { content: counter(c); }
10 .fl:first-letter { }
12 </style>
14 <script>
16 var xblize, div;
18 function boom()
19 {
20 xblize = document.getElementById("xblize");
21 div = document.getElementById("div");
23 xblize.style.MozBinding = "url('#empty')";
25 // Give the XBL extra time to settle
26 setTimeout(boom2, 200);
27 }
29 function boom2()
30 {
31 div.removeChild(xblize);
32 div.appendChild(xblize);
34 document.documentElement.removeAttribute("class");
35 }
37 </script>
38 </head>
40 <body onload="boom();">
42 <div class="fl" id="div"><span class="bef" id="xblize"></span><span class="bef"></span></div>
44 </body>
45 </html>