Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!--
2 Any copyright is dedicated to the Public Domain.
3 http://creativecommons.org/publicdomain/zero/1.0/
4 -->
5 <svg xmlns="http://www.w3.org/2000/svg" version="1.1"
6 xmlns:xlink="http://www.w3.org/1999/xlink">
8 <!-- In case we actually _can_ access the external resource (e.g. on Android
9 where reftests are served as http:// instead of file://), we include
10 this <use> element to be sure the resource loads before onload so that
11 we'll fail reliably. -->
12 <use xlink:href="../filters.svg#empty" />
14 <!-- giant lime rect, to match pass.svg -->
15 <rect height="100%" width="100%" fill="lime" />
17 <!-- The filter shouldn't resolve, so this should be transparent: -->
18 <rect height="100%" width="100%" fill="red"
19 filter="url(../filters.svg#NonWhiteToBlack)"/>
20 </svg>