aboutsummaryrefslogtreecommitdiff
path: root/src/test
Commit message (Collapse)AuthorAge
* Create routerparse.hSebastian Hahn2010-07-27
|
* Create rephist.hSebastian Hahn2010-07-27
|
* Create policies.hSebastian Hahn2010-07-27
|
* Create onion.hSebastian Hahn2010-07-27
|
* Create networkstatus.hSebastian Hahn2010-07-27
|
* Create dirvote.hSebastian Hahn2010-07-27
|
* Create dirserv.hSebastian Hahn2010-07-27
|
* Create directory.hSebastian Hahn2010-07-27
|
* Create control.hSebastian Hahn2010-07-27
|
* Create connection_edge.hSebastian Hahn2010-07-27
|
* Create config.hSebastian Hahn2010-07-27
|
* Create circuitbuild.hSebastian Hahn2010-07-27
|
* Create buffers.hSebastian Hahn2010-07-27
|
* Create rendcommon.hSebastian Hahn2010-07-27
|
* Create routerlist.hSebastian Hahn2010-07-27
|
* Create router.hSebastian Hahn2010-07-27
|
* Create geoip.hSebastian Hahn2010-07-27
|
* Fix unittest failure in bug 1660.Mike Perry2010-07-06
| | | | | | | | | | We now record large times as abandoned, to prevent a filter step from happening and skewing our results. Also, issue a warn for a rare case that can happen for funky values of Xm or too many abandoned circuits. Can happen (very rarely) during unit tests, but should not be possble during live operation, due to network liveness filters and discard logic.
* Merge remote branch 'public/rand_double2'Nick Mathewson2010-06-29
|\
| * Add a function to return a double in range [0,1).Nick Mathewson2010-06-22
| |
* | Merge remote branch 'mikeperry/cbt-bugfixes3'Nick Mathewson2010-06-29
|\ \
| * | Split the circuit timeout and close codepaths.Mike Perry2010-06-15
| | | | | | | | | | | | | | | | | | | | | | | | We need to record different statistics at point of timeout, vs the point of forcible closing. Also, give some better names to constants and state file variables to indicate they are not dealing with timeouts, but abandoned circuits.
| * | Address some issues with unit tests.Mike Perry2010-06-09
| | | | | | | | | | | | | | | | | | Histogram conversion causes accuracy loss, and there are some boundary conditions when we hit 1000 circuits that cause false negative test results.
| * | Fix CBT unit tests.Mike Perry2010-05-12
| |/
* / Fix typo in tinytest_demoSteven Murdoch2010-06-25
|/
* Add --enable-static-zlib optionSebastian Hahn2010-04-14
| | | | | | | Works like the --enable-static-openssl/libevent options. Requires --with-zlib-dir to be set. Note that other dependencies might still pull in a dynamicly linked zlib, if you don't link them in statically too.
* Merge commit 'origin/maint-0.2.1'Nick Mathewson2010-04-12
| | | | | Conflicts: src/or/test.c
* Merge branch 'asprintf'Nick Mathewson2010-04-02
|\
| * Add a tor_asprintf() function, and use it in a couple of places.Nick Mathewson2010-02-25
| | | | | | | | | | | | | | | | | | | | asprintf() is a GNU extension that some BSDs have picked up: it does a printf into a newly allocated chunk of RAM. Our tor_asprintf() differs from standard asprintf() in that: - Like our other malloc functions, it asserts on OOM. - It works on windows. - It always sets its return-field.
* | Update copyright dates for files not in maint-0.2.1Nick Mathewson2010-02-27
| |
* | Merge remote branch 'origin/maint-0.2.1'Nick Mathewson2010-02-27
| | | | | | | | | | | | Conflicts: src/common/test.h src/or/test.c
* | Remove misc unnecessary newlines found by new check.Mike Perry2010-02-22
|/
* Move CBT params into consensus.Mike Perry2010-02-18
|
* Another unit test for exit_policy_is_general_exit()Sebastian Hahn2010-02-09
|
* Another unit test for exit_policy_is_general_exit()Sebastian Hahn2010-02-04
|
* New unit test, testing for b0red's exit policySebastian Hahn2010-02-04
|
* Another new test for exit_policy_is_general_exit()Sebastian Hahn2010-02-03
|
* New testcase for exit_policy_is_general_exitSebastian Hahn2010-02-03
|
* Rearrange _thread_test_func to please Coverity ScanNick Mathewson2010-01-25
| | | | | | | | I believe that since we were allocating *cp while holding a mutex, coverity deduced that *cp must be protected by that mutex, and later flipped out when we didn't use it that way. If this is so, we can solve our problems by moving the *cp = tor_strdup(buf) part outside of the mutex-protected code.
* Merge commit 'origin/maint-0.2.1'Nick Mathewson2010-01-24
| | | | | | | Resolved conflicts in: configure.in src/or/Makefile.am src/tools/Makefile.am
* Merge branch 'ewma'Nick Mathewson2009-12-18
|\
| * Enhance pqueue so we can remove items from the middle.Nick Mathewson2009-12-12
| | | | | | | | | | | | This changes the pqueue API by requiring an additional int in every structure that we store in a pqueue to hold the index of that structure within the heap.
* | Remove duplicate words and a duplicate newline.Karsten Loesing2009-12-18
| |
* | Refactor out the 'find string at start of any line' logic.Nick Mathewson2009-12-17
|/ | | | | | | | We do this in too many places throughout the code; it's time to start clamping down. Also, refactor Karsten's patch to use strchr-then-strndup, rather than malloc-then-strlcpy-then-strchr-then-clear.
* Fix building from a separate build directory.Nick Mathewson2009-11-08
|
* Fix bug 1113.Karsten Loesing2009-10-27
| | | | Bridges do not use the default exit policy, but reject *:* by default.
* Fix the very noisy unit test memory leak of CID 420-421.Nick Mathewson2009-10-26
| | | | | On any failing case in test_util_config_line, we would leak a couple of strings.
* Fix a very stupid coverity complaint (CID 416).Nick Mathewson2009-10-26
| | | | | | In its zeal to keep me from saying memset(x, '0', sizeof(x)), Coverity disallows memset(x, 48, sizeof(x)). Fine. I'll choose a different magic number, see if I care!
* Fix CID 409: check return value of base64_encode in testsNick Mathewson2009-10-26
|
* Reduce log level for someone else sending us weak DH keys.Karsten Loesing2009-10-25
| | | | | | | | See task 1114. The most plausible explanation for someone sending us weak DH keys is that they experiment with their Tor code or implement a new Tor client. Usually, we don't care about such events, especially not on warn level. If we really care about someone not following the Tor protocol, we can set ProtocolWarnings to 1.