dom/tests/mochitest/dom-level2-html/files/form2.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
     2  "http://www.w3.org/TR/html4/loose.dtd">
     3 <HTML>
     4 <HEAD>
     5 <META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=utf-8">
     6 <TITLE>NIST DOM HTML Test - FORM</TITLE>
     7 </HEAD>
     8 <BODY onload="parent.loadComplete()">
     9 <FORM ID="form1" TARGET="dynamic" ACCEPT-CHARSET="US-ASCII" ACTION="./files/getData.pl" ENCTYPE="application/x-www-form-urlencoded" METHOD="post">
    10 <P>
    11 <TEXTAREA NAME="text1" COLS="20" ROWS="7"></TEXTAREA>
    12 <INPUT TYPE="submit" NAME="submit1" VALUE="Submit" />
    13 <INPUT TYPE="reset" NAME="submit2" VALUE="Reset" />
    14 </P>
    15 </FORM>
    16 </BODY>
    17 </HTML>

mercurial