Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html>
2 <!--
3 https://bugzilla.mozilla.org/show_bug.cgi?id=570378
4 -->
5 <head>
6 <title>Test for Bug 570378</title>
7 <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
8 <script type="text/javascript" src="/tests/SimpleTest/WindowSnapshot.js"></script>
9 <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
10 </head>
11 <body>
12 <a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=570378">Mozilla Bug 570378</a>
14 <pre id="test">
15 <script type="text/javascript">
17 /** Test for Bug 570378 **/
19 var passes = [
20 // bug 570378 tests (Arabic and Persian)
21 {prefix: "bug570378-persian", file: 4, bidiNumeralValue: 1, op: "=="},
22 ];
24 </script>
25 <script type="text/javascript" src="bidi_numeral_test.js"></script>
26 </pre>
27 </body>
28 </html>