Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE html>
2 <html>
3 <head>
4 <script type="application/javascript">
5 function setup() {
6 // Set up different target objects for expandos, one for each binding type.
7 window.targetWN = window;
8 window.targetDOM = new XMLHttpRequest();
9 window.targetJS = new Date();
10 }
12 function placeExpando(name, val, target) {
13 target[name] = val;
14 }
16 // If val === null, then we shouldn't have access.
17 function checkExpando(name, val, target, msg) {
18 if (val !== null) {
19 ok(name in target, msg);
20 try {
21 is(target[name], val, "Got the right expando value");
22 } catch(e) { ok(false, "Threw when accessing same-origin expando"); }
23 }
24 else {
25 ok(!(name in target), msg);
26 }
27 }
29 </script>
30 </head>
31 <body onload="setup();">
32 <span>Salut, Ma Cherise. ;-)</span>
33 </body>
34 </html>