netwerk/test/unit/test_bug952927.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 var rawData = new Uint8Array([65,66,67,68]);
     2 var data = String.fromCharCode.apply(null, rawData);
     4 function UDPSocketListener(){}
     6 UDPSocketListener.prototype = {
     7   QueryInterface : XPCOMUtils.generateQI([Ci.nsIUDPSocketListener]),
     9   onPacketReceived : function(aSocket, aMessage){
    10     var mData = String.fromCharCode.apply(null, aMessage.rawData);
    11     do_check_eq(mData, data);
    12     do_check_eq(mData, aMessage.data);
    13     do_test_finished();
    14   },
    16   onStopListening: function(aSocket, aStatus){}
    17 };
    20 function run_test(){
    21   var socket = Cc["@mozilla.org/network/udp-socket;1"].createInstance(Ci.nsIUDPSocket);
    23   socket.init(-1, true);
    24   do_print("Port assigned : " + socket.port);
    25   socket.asyncListen(new UDPSocketListener());
    27   var written = socket.send("127.0.0.1", socket.port, rawData, rawData.length);
    28   do_check_eq(written, data.length);
    29   do_test_pending();
    30 }

mercurial