Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html xmlns="http://www.w3.org/1999/xhtml">
2 <!--
3 https://bugzilla.mozilla.org/show_bug.cgi?id=343870
4 -->
5 <head>
6 <title>Test for Bug 343870</title>
7 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
8 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
9 </head>
10 <body>
11 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=343870">Mozilla Bug 343870</a>
12 <p id="display"></p>
13 <div id="content" style="display: none">
15 </div>
16 <pre id="test">
17 <script class="testbody" type="text/javascript">
18 <![CDATA[
20 /** Test for Bug 343870 **/
21 function doTest() {
22 var dataDoc = document.getElementById("d").contentDocument;
23 is(dataDoc.getElementById("lf").firstChild.data, "\n");
24 is(dataDoc.getElementById("cr").firstChild.data, "\n");
25 is(dataDoc.getElementById("crlf").firstChild.data, "\n");
26 is(dataDoc.getElementById("escapedcr").firstChild.data, "\r");
27 }
29 SimpleTest.waitForExplicitFinish();
30 addLoadEvent(doTest);
31 addLoadEvent(SimpleTest.finish);
33 ]]>
34 </script>
35 </pre>
36 <iframe id="d" src="data:application/xml,%3C%3Fxml version%3D'1.0' encoding%3D'utf-8'%3F%3E%3Chtml xmlns%3D'http%3A//www.w3.org/1999/xhtml'%3E%3Cp id%3D'lf'%3E%0A%3C/p%3E%3Cp id%3D'cr'%3E%0D%3C/p%3E%3Cp id%3D'crlf'%3E%0D%0A%3C/p%3E%3Cp id%3D'escapedcr'%3E%26%2313;%3C/p%3E%3C/html%3E"></iframe>
37 </body>
38 </html>