xpcom/tests/unit/test_comp_no_aslr.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 Components.utils.import("resource://gre/modules/XPCOMUtils.jsm");
     3 const Cc = Components.classes;
     4 const Ci = Components.interfaces;
     6 function run_test() {
     7   let manifest = do_get_file('testcompnoaslr.manifest');
     8   Components.manager.autoRegister(manifest);
     9   var sysInfo = Cc["@mozilla.org/system-info;1"].
    10                 getService(Ci.nsIPropertyBag2);
    11   var ver = parseFloat(sysInfo.getProperty("version"));
    12   if (ver < 6.0) {
    13     // This is disabled on pre-Vista OSs.
    14     do_check_true("{335fb596-e52d-418f-b01c-1bf16ce5e7e4}" in Components.classesByID);
    15   } else {
    16     do_check_false("{335fb596-e52d-418f-b01c-1bf16ce5e7e4}" in Components.classesByID);
    17   }
    18 }

mercurial