Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function testAddInconvertibleObjectInconvertibleObject()
2 {
3 var count1 = 0;
4 function toString1() { ++count1; if (count1 == 95) return {}; return "" + count1; }
5 var o1 = {valueOf: undefined, toString: toString1};
6 var count2 = 0;
7 function toString2() { ++count2; if (count2 == 95) return {}; return "" + count2; }
8 var o2 = {valueOf: undefined, toString: toString2};
10 var threw = false;
11 try
12 {
13 for (var i = 0; i < 100; i++)
14 var q = o1 + o2;
15 }
16 catch (e)
17 {
18 threw = true;
19 if (i !== 94)
20 return "expected i === 94, got " + i;
21 if (q !== "9494")
22 return "expected q === '9494', got " + q + " (type " + typeof q + ")";
23 if (count1 !== 95)
24 return "expected count1 === 95, got " + count1;
25 if (count2 !== 94)
26 return "expected count2 === 94, got " + count2;
27 }
28 if (!threw)
29 return "expected throw with o1 + o2";
31 return "pass";
32 }
33 assertEq(testAddInconvertibleObjectInconvertibleObject(), "pass");