Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <?xml version="1.0"?>
2 <?xml-stylesheet type="text/css" href="chrome://global/skin"?>
3 <?xml-stylesheet type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"?>
4 <window title="Test for StringEncoding API"
5 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
6 <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"/>
8 <!-- test results are displayed in the html:body -->
9 <body xmlns="http://www.w3.org/1999/xhtml">
10 </body>
12 <!-- test code goes here -->
13 <script type="application/javascript"><![CDATA[
15 /** Test for StringEncoding API. **/
16 const Cu = Components.utils;
18 // Import our test JSM. We first strip the filename off
19 // the chrome url, then append the jsm filename.
20 var base = /.*\//.exec(window.location.href)[0];
21 Cu.import(base + "file_stringencoding.jsm");
23 checkFromJSM(is);
25 ]]></script>
26 </window>