Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 [DEFAULT]
2 head = header_helpers.js
3 tail =
5 [test_ril_worker_buf.js]
6 [test_ril_worker_icc.js]
7 [test_ril_worker_sms.js]
8 # Bug 916067 - B2G RIL: test_ril_worker_sms.js takes too long to finish
9 skip-if = true
10 [test_ril_worker_sms_cdma.js]
11 [test_ril_worker_sms_cdmapduhelper.js]
12 [test_ril_worker_sms_nl_tables.js]
13 [test_ril_worker_sms_gsmpduhelper.js]
14 [test_ril_worker_sms_segment_info.js]
15 [test_ril_worker_mmi.js]
16 [test_ril_worker_cf.js]
17 [test_ril_worker_cellbroadcast_config.js]
18 [test_ril_worker_cellbroadcast.js]
19 [test_ril_worker_ruim.js]
20 [test_ril_worker_cw.js]
21 [test_ril_worker_clir.js]
22 [test_ril_worker_clip.js]
23 [test_ril_worker_ssn.js]
24 [test_ril_worker_voiceprivacy.js]
25 [test_ril_worker_ecm.js]
26 [test_ril_worker_stk.js]
27 [test_ril_worker_barring_password.js]
28 [test_ril_worker_cdma_info_rec.js]