Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | // This is just a crashtest for a url that is rejected at parse time (port 80,000) |
michael@0 | 2 | |
michael@0 | 3 | function completeTest(request, data, ctx) |
michael@0 | 4 | { |
michael@0 | 5 | do_test_finished(); |
michael@0 | 6 | } |
michael@0 | 7 | |
michael@0 | 8 | function run_test() |
michael@0 | 9 | { |
michael@0 | 10 | var ios = Components.classes["@mozilla.org/network/io-service;1"]. |
michael@0 | 11 | getService(Components.interfaces.nsIIOService); |
michael@0 | 12 | var chan = ios.newChannel("http://localhost:80000/", "", null); |
michael@0 | 13 | var httpChan = chan.QueryInterface(Components.interfaces.nsIHttpChannel); |
michael@0 | 14 | httpChan.asyncOpen(new ChannelListener(completeTest, |
michael@0 | 15 | httpChan, CL_EXPECT_FAILURE), null); |
michael@0 | 16 | do_test_pending(); |
michael@0 | 17 | } |
michael@0 | 18 |