Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE HTML>
2 <html>
3 <body>
4 <script type="application/javascript">
6 function ok(a, msg) {
7 window.parent.postMessage({ status: a ? "OK" : "KO", message: msg }, "*");
8 }
10 window.addEventListener('message', receiveMessage, false);
11 function receiveMessage(evt) {
12 ok (evt.data, "Data received");
13 ok (evt.data.port instanceof MessagePort, "Data contains a MessagePort");
15 var a = new MessageChannel();
16 window.parent.postMessage({ status: "FINISH", port: a.port2 }, '*', [a.port2]);
17 }
19 </script>
20 </body>
21 </html>