tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

blocks-extraneous-data-008.xht (1345B)


      1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
      2 <!-- THIS FILE WAS AUTOMATICALLY GENERATED, DO NOT EDIT. -->
      3 <html xmlns="http://www.w3.org/1999/xhtml">
      4 	<head>
      5 		<meta http-equiv="content-type" content="text/html;charset=UTF-8"/>
      6 		<title>WOFF Test: Extraneous Data After Private Data</title>
      7 		<link rel="author" title="Tal Leming" href="http://typesupply.com" />
      8 		<link rel="help" href="http://dev.w3.org/webfonts/WOFF2/spec/#FileStructure" />
      9 		<link rel="help" href="http://dev.w3.org/webfonts/WOFF2/spec/#conform-extraneous-reject" />
     10 		<link rel="reviewer" title="Chris Lilley" href="mailto:chris@w3.org" />
     11 		<link rel="match" href="blocks-extraneous-data-008-ref.xht" />
     12 		<meta name="assert" content="There are four null bytes after the private data." />
     13 		<style type="text/css"><![CDATA[
     14 			@import url("support/test-fonts.css");
     15 			@font-face {
     16 				font-family: "WOFF Test";
     17 				src: url("support/blocks-extraneous-data-008.woff2") format("woff2");
     18 			}
     19 			body {
     20 				font-size: 20px;
     21 			}
     22 			pre {
     23 				font-size: 12px;
     24 			}
     25 			.test {
     26 				font-family: "WOFF Test", "WOFF Test CFF Fallback";
     27 				font-size: 200px;
     28 				margin-top: 50px;
     29 			}
     30 		]]></style>
     31 	</head>
     32 	<body>
     33 		<p>Test passes if the word PASS appears below.</p>
     34 		<div class="test">F</div>
     35 	</body>
     36 </html>