content/base/test/unit/test_bug737966.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /* Any copyright is dedicated to the Public Domain.
michael@0 2 * http://creativecommons.org/publicdomain/zero/1.0/
michael@0 3 */
michael@0 4
michael@0 5 /* If charset parameter is invalid, the encoding should be detected as UTF-8 */
michael@0 6
michael@0 7 function run_test()
michael@0 8 {
michael@0 9 let body = '<?xml version="1.0"><html>%c3%80</html>';
michael@0 10 let result = '<?xml version="1.0"><html>\u00c0</html>';
michael@0 11
michael@0 12 let xhr = Components.classes['@mozilla.org/xmlextras/xmlhttprequest;1'].
michael@0 13 createInstance(Components.interfaces.nsIXMLHttpRequest);
michael@0 14 xhr.open('GET',
michael@0 15 'data:text/xml;charset=abc,' + body,
michael@0 16 false);
michael@0 17 xhr.send(null);
michael@0 18
michael@0 19 do_check_eq(xhr.responseText, result);
michael@0 20 }

mercurial