Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <!DOCTYPE HTML>
2 <html>
3 <head>
4 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
5 <script type="application/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
6 <script type="application/javascript" src="head.js"></script>
7 </head>
8 <body>
9 <pre id="test">
10 <script type="application/javascript">
11 createHTML({
12 bug: "822674",
13 title: "mozRTCPeerConnection isn't a true javascript object as it should be"
14 });
16 runTest(function () {
17 var pc = new mozRTCPeerConnection();
19 pc.thereIsNeverGoingToBeAPropertyWithThisNameOnThisInterface = 1;
20 is(pc.thereIsNeverGoingToBeAPropertyWithThisNameOnThisInterface, 1,
21 "Can set expandos on an RTCPeerConnection");
23 pc = null;
24 SimpleTest.finish();
25 });
26 </script>
27 </pre>
28 </body>
29 </html>