Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <svg xmlns="http://www.w3.org/2000/svg" class="reftest-wait">
3 <script>
4 <![CDATA[
6 function boom()
7 {
8 try {
9 document.getElementById("set").beginElementAt(NaN);
10 return;
11 } catch (e) {}
12 try {
13 document.getElementById("set").endElementAt(NaN);
14 return;
15 } catch (e) {}
17 // If we got here we threw both exceptions and skipped both early-returns, as
18 // expected.
19 document.documentElement.removeAttribute("class");
20 }
22 window.addEventListener("load", boom, false);
24 ]]>
25 </script>
27 <set id="set" attributeName="fill" to="green" begin="indefinite"/>
29 </svg>