tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

scripthash-allowed.sub.html (1403B)


      1 <!DOCTYPE html>
      2 <html>
      3 
      4 <head>
      5    <!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
      6    <meta http-equiv="Content-Security-Policy" content="script-src 'self' 'nonce-abc' 'sha256-IFmozo9WnnsMXVl/Ka8XzJ3Nd8yzS2zA2ME0mwtd+Ck=' 'sha256-jSpTmJKcrnHttKdYM/wCCDJoQY5tdSxNf7zd2prwFfI=' 'sha256-qbgA2XjB2EZKjn/UmK7v/K77t+fvfxA89QT/K9qPNyE=' 'sha256-K+7X5Ip3msvRvyQzf6fkrWZziuhaUIee1aLnlP5nX10='; connect-src 'self';">
      7    <title>scripthash-allowed</title>
      8    <script src="/resources/testharness.js"></script>
      9    <script src="/resources/testharnessreport.js"></script>
     10    <script src="/content-security-policy/support/alertAssert.sub.js?alerts=%5B%22PASS%20(1%2F4)%22%2C%22PASS%20(2%2F4)%22%2C%22PASS%20(3%2F4)%22%2C%22PASS%20(4%2F4)%22%5D">
     11    <script>
     12        window.addEventListener('securitypolicyviolation', function(e) {
     13            alert_assert("Fail");
     14        });
     15    </script>
     16 
     17    <script>
     18        alert_assert('PASS (1/4)');
     19 
     20    </script>
     21    <script>
     22        alert_assert('PASS (2/4)');
     23 
     24    </script>
     25    <script>
     26        alert_assert('PASS (3/4)');
     27 
     28    </script>
     29    <script>
     30        alert_assert('PASS (4/4)');
     31 
     32    </script>
     33 </head>
     34 
     35 <body>
     36    <p>
     37        This tests the effect of a valid script-hash value. It passes if no CSP violation is generated, and the alert_assert() is executed.
     38    </p>
     39    <div id="log"></div>
     40 </body>
     41 
     42 </html>