Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | function run_test() { |
michael@0 | 2 | var stream = Cc["@mozilla.org/io/string-input-stream;1"]. |
michael@0 | 3 | createInstance(Ci.nsISupportsCString); |
michael@0 | 4 | stream.data = "foo bar baz"; |
michael@0 | 5 | |
michael@0 | 6 | var pump = Cc["@mozilla.org/network/input-stream-pump;1"]. |
michael@0 | 7 | createInstance(Ci.nsIInputStreamPump); |
michael@0 | 8 | pump.init(stream, -1, -1, 0, 0, false); |
michael@0 | 9 | |
michael@0 | 10 | // When we pass a null listener argument too asyncRead we expect it to throw |
michael@0 | 11 | // instead of crashing. |
michael@0 | 12 | try { |
michael@0 | 13 | pump.asyncRead(null, null); |
michael@0 | 14 | } |
michael@0 | 15 | catch (e) { |
michael@0 | 16 | return; |
michael@0 | 17 | } |
michael@0 | 18 | |
michael@0 | 19 | do_throw("asyncRead didn't throw when passed a null listener argument."); |
michael@0 | 20 | } |