Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function testBitOrInconvertibleObjectAny()
2 {
3 var count = 0;
4 function toString() { ++count; if (count == 95) return {}; return count; }
5 var o = {valueOf: undefined, toString: toString};
7 var threw = false;
8 try
9 {
10 for (var i = 0; i < 100; i++)
11 var q = o | 1;
12 }
13 catch (e)
14 {
15 threw = true;
16 if (i !== 94)
17 return "expected i === 94, got " + i;
18 if (q !== 95)
19 return "expected q === 95, got " + q;
20 if (count !== 95)
21 return "expected count === 95, got " + count;
22 }
23 if (!threw)
24 return "expected throw with o | 2";
26 return "pass";
27 }
28 assertEq(testBitOrInconvertibleObjectAny(), "pass");