Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html>
2 <head>
3 <title>NPAPI NPN_PostURL NPStream Test</title>
4 <script type="text/javascript"
5 src="/tests/SimpleTest/SimpleTest.js"></script>
6 <script type="text/javascript"
7 src="pluginstream.js"></script>
8 <script type="text/javascript" src="utils.js"></script>
9 <script type="text/javascript">
10 setTestPluginEnabledState(SpecialPowers.Ci.nsIPluginTag.STATE_ENABLED);
11 </script>
12 <link rel="stylesheet" type="text/css"
13 href="/tests/SimpleTest/test.css" />
14 </head>
15 <body>
16 <p id="display"></p>
18 <iframe id="testframe" name="testframe" onload="frameLoaded()"></iframe>
20 <!--
21 - Same as test_pluginstream_post.html, except NULL is passed to NPN_PostURL
22 - as the frame parameter, so the HTTP response to the post is passed to the
23 - plugin via NPP_NewStream. Once this stream is received, it's displayed
24 - in a frame in the browser via a call to NPN_GetURL.
25 -->
26 <embed src="loremipsum.txt" streammode="normal"
27 frame="testframe" posturl="post.sjs" postmode="stream"
28 id="embedtest" style="width: 400px; height: 100px;"
29 type="application/x-test"></embed>
30 </body>
31 </html>