Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 var timer;
2 var callback;
4 function handleRequest(request, response)
5 {
6 if (request.queryString.indexOf("trigger") != -1) {
7 setState("triggered", "triggered");
8 response.setHeader("Cache-Control", "no-cache", false);
9 response.setHeader("Content-Type", "text/javascript; charset=utf-8", false);
10 response.write(";");
11 } else {
12 response.processAsync();
13 response.setHeader("Cache-Control", "no-cache", false);
14 response.setHeader("Content-Type", "text/html; charset=utf-8", false);
15 response.write("<table><tr><td>A</td> ");
16 response.bodyOutputStream.flush();
17 timer = Components.classes["@mozilla.org/timer;1"]
18 .createInstance(Components.interfaces.nsITimer);
20 callback = function() {
21 if (getState("triggered") == "triggered") {
22 response.write("<td>B</td></tr></table>");
23 response.finish();
24 } else {
25 timer.initWithCallback(callback,
26 10,
27 Components.interfaces.nsITimer.TYPE_ONE_SHOT);
28 }
29 }
30 timer.initWithCallback(callback,
31 10,
32 Components.interfaces.nsITimer.TYPE_ONE_SHOT);
33 }
34 }