Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 support-files =
3 driver-info.js
4 webgl-util.js
6 [test_depth_readpixels.html]
7 [test_draw.html]
8 [test_fb_param.html]
9 [test_fb_param_crash.html]
10 [test_highp_fs.html]
11 [test_no_arr_points.html]
12 [test_noprog_draw.html]
13 [test_privileged_exts.html]
14 [test_texsubimage_float.html]
15 [test_webgl_available.html]
16 skip-if = toolkit == 'android' #bug 865443- seperate suite - the non_conf* tests pass except for one on armv6 tests
17 [test_webgl_conformance.html]
18 skip-if = toolkit == 'android' #bug 865443- seperate suite - the non_conf* tests pass except for one on armv6 tests
19 [test_webgl_request_context.html]
20 skip-if = toolkit == 'android' #bug 865443- seperate suite - the non_conf* tests pass except for one on armv6 tests
21 [test_webgl_request_mismatch.html]
22 skip-if = toolkit == 'android' #bug 865443- seperate suite - the non_conf* tests pass except for one on armv6 tests
23 [test_webgl2_not_exposed.html]
24 skip-if = toolkit == 'android' #bug 865443- seperate suite - the non_conf* tests pass except for one on armv6 tests