aboutsummaryrefslogtreecommitdiff
path: root/src/test
Commit message (Expand)AuthorAge
...
| * | | Separate generation of an entry-stats string from writing it to disk.•••This commit is similar to the previous two commits for dirreq-stats, but for entry-stats. Karsten Loesing2011-08-04
| * | | Separate generation of a dirreq-stats string from writing it to disk.•••This patch separates the generation of a dirreq-stats string from actually writing it to disk. The new geoip_format_dirreq_stats() generates a dirreq-stats string that geoip_dirreq_stats_write() writes to disk. All the state changing (e.g., resetting the dirreq-stats history and initializing the next measurement interval) takes place in geoip_dirreq_stats_write(). That allows us to finally test the dirreq-stats code better. Karsten Loesing2011-08-04
| * | | Add unit tests for buffer-stats.•••Now that formatting the buffer-stats string is separate from writing it to disk, we can also decouple the logic to extract stats from circuits and finally write some unit tests for the history code. Karsten Loesing2011-08-04
| * | | Unit test for generic_buffer_set_to_copyNick Mathewson2011-07-20
* | | | Complete logging of output from port forwarding helperSteven Murdoch2011-08-18
* | | | Test case for reading the partial output of a background processSteven Murdoch2011-07-25
* | | | Use PeekNamedPipe to avoid blocking ReadFile when there is nothing to readSteven Murdoch2011-07-22
* | | | Add code to read all from a handle, but this block forever•••See http://stackoverflow.com/questions/3722409/windows-child-process-with-redirected-input-and-output for a potential solution Steven Murdoch2011-07-22
* | | | Add Windows version of tor_spawn_background and ancillary functionsSteven Murdoch2011-07-21
* | | | Generalize process spawning so its test compiles (but fails) in Windows•••- pid, stdout/stderr_pipe now encapsulated in process_handle - read_all replaced by tor_read_all_from_process_stdin/stderr - waitpid replaced by tor_get_exit_code Untested on *nix Steven Murdoch2011-07-21
|/ / /
* | | Remove compare_addr_to_addr_policy•••Nothing used it but the unit tests; everything else knows to use compare_tor_addr_to_addr_policy instead. Nick Mathewson2011-07-15
* | | Merge remote-tracking branch 'public/bug1666'•••Conflicts: doc/spec/socks-extensions.txt src/or/buffers.c src/or/config.c src/or/connection_edge.c Nick Mathewson2011-07-13
|\ \ \
| * | | Refactor fetch_from_buf_socks() to be greedy•••Previously, fetch_from_buf_socks() might return 0 if there was still data on the buffer and a subsequent call to fetch_from_buf_socks() would return 1. This was making some of the socks5 unit tests harder to write, and could potentially have caused misbehavior with some overly verbose SOCKS implementations. Now, fetch_from_buf_socks() does as much processing as it can, and returns 0 only if it really needs more data. This brings it into line with the evbuffer socks implementation. Nick Mathewson2011-06-29
| * | | Refactor socks unit tests into a suite of their ownNick Mathewson2011-06-29
| * | | Record username/password data in socks_request_t•••This change also requires us to add and use a pair of allocator/deallocator functions for socks_request_t, instead of using tor_malloc_zero/tor_free directly. Nick Mathewson2011-06-29
| * | | Fix 'make check-spaces'Nick Mathewson2011-06-29
| * | | bug1666 - Pass-through support for SOCKS5 authentication(4)•••Implement nickm's suggestion that we tolerate SOCKS5 clients that send authentication credentials and SOCKS commands all in one go. Robert Hogan2010-12-14
| * | | bug1666 - Pass-through support for SOCKS5 authentication (2)•••Address Nick's comments: - Refactor against changes in buffers.c - Ensure we have negotiated a method before accepting authentication credentials Robert Hogan2010-12-14
| * | | bug1666 - Pass-through support for SOCKS5 authentication•••If a SOCKS5 client insists on authentication, allow it to negotiate a connection with Tor's SOCKS server successfully. Any credentials the client provides are ignored. This allows Tor to work with SOCKS5 clients that can only support 'authenticated' connections. Also add a bunch of basic unit tests for SOCKS4/4a/5 support in buffers.c. Robert Hogan2010-12-14
* | | | Check return value of crypto_global_init in test.c•••This will let the unit tests fail in a less mystifying way if the crypto subsystem is b0rken, and will also make Coverity happier. CID # 429. Nick Mathewson2011-07-01
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-06-22
|\ \ \ \ | | |/ / | |/| |
| * | | Fix minor comment issuesRobert Ransom2011-06-22
| * | | Fix comment typoRobert Ransom2011-06-22
* | | | Make the get_options() return const•••This lets us make a lot of other stuff const, allows the compiler to generate (slightly) better code, and will make me get slightly fewer patches from folks who stick mutable stuff into or_options_t. const: because not every input is an output! Nick Mathewson2011-06-14
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-06-14
|\| | | | |_|/ |/| |
| * | Check some more return values in unit testsSebastian Hahn2011-06-08
* | | Upgrade to the latest version of tinytestNick Mathewson2011-06-09
* | | Prefer tt_assert in unit tests, not tor_assertNick Mathewson2011-06-08
* | | Fix a minor coverity-found bug in testsSebastian Hahn2011-06-08
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-06-03
|\| |
| * | Reject 128-byte keys that are not 1024-bit•••When we added the check for key size, we required that the keys be 128 bytes. But RSA_size (which defers to BN_num_bytes) will return 128 for keys of length 1017..1024. This patch adds a new crypto_pk_num_bits() that returns the actual number of significant bits in the modulus, and uses that to enforce key sizes. Also, credit the original bug3318 in the changes file. Nick Mathewson2011-06-03
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-28
|\| |
| * | Fix GCC 4.6's new -Wunused-but-set-variable warnings.•••Most instances were dead code; for those, I removed the assignments. Some were pieces of info we don't currently plan to use, but which we might in the future. For those, I added an explicit cast-to-void to indicate that we know that the thing's unused. Finally, one was a case where we were testing the wrong variable in a unit test. That one I fixed. This resolves bug 3208. Nick Mathewson2011-05-23
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-15
|\| |
| * | Add a function to pull off the final component of a pathNick Mathewson2011-05-15
* | | Fixup whitespace issues from 3122 commit in 0.2.3Nick Mathewson2011-05-15
* | | Merge remote-tracking branch 'public/bug3122_memcmp_022' into bug3122_memcmp_023•••Conflicts in various places, mainly node-related. Resolved them in favor of HEAD, with copying of tor_mem* operations from bug3122_memcmp_022. src/common/Makefile.am src/or/circuitlist.c src/or/connection_edge.c src/or/directory.c src/or/microdesc.c src/or/networkstatus.c src/or/router.c src/or/routerlist.c src/test/test_util.c Nick Mathewson2011-05-11
|\| |
| * | fwd-port test_util_di_ops into tinytest formatNick Mathewson2011-05-11
* | | Link to libevent_openssl statically when requested•••When configure tor with --enable-bufferevents and --enable-static-libevent, libevent_openssl would still be linked dynamically. Fix this and refactor src/or/Makefile.am along the way. Sebastian Hahn2011-05-06
* | | Use read_all() to read messages from spawn_background•••Using read() is an invitation to get some of the data you want, not all. Possible fix for bug 2462 Nick Mathewson2011-05-04
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/microdesc.c Nick Mathewson2011-05-03
|\| |
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-04-19
|\| |
| * | Standardize our printf code on %d, not %i.Nick Mathewson2011-04-19
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-04-07
|\| |
| * | Use GetTempDir instead of hardcoded path to c:\windows\tmp for unittestsGisle Vanem2011-04-07
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/common/crypto.c Nick Mathewson2011-03-16
|\| |
| * | Clean up whitespaceNick Mathewson2011-03-16
* | | Merge remote branch 'origin/maint-0.2.2'Nick Mathewson2011-01-24
|\| |
| * | Make the DH parameter we use for TLS match the one from Apache's mod_ssl•••Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance. Nick Mathewson2011-01-24
* | | Merge branch 'maint-0.2.2'Roger Dingledine2011-01-15
|\| |