- Jan 06, 2020
-
-
- Oct 04, 2019
-
-
Nick Mathewson authored
Based on examination of our tests, this mock function accepts "localhost" and "torproject.org", and rejects everything else.
-
- Oct 03, 2019
-
-
Nick Mathewson authored
-
- Sep 14, 2019
-
-
Nick Mathewson authored
This script takes a set of example torrcs and command-lines from src/test/conf_examples. If a success is expected, it runs "tor --dump-config" and compares the result with the one we expect. If a failure is expected, it runs "tor --verify-config" and greps for the error we expect.
-
- Sep 11, 2019
-
-
-
(This option tests our existing behavior, not necessarily the most sensible behavior.)
-
- Sep 05, 2019
-
-
- Aug 28, 2019
-
-
Nick Mathewson authored
This test case, at this point, only constructs the confmgr object. More code to come.
-
- Aug 06, 2019
-
-
David Goulet authored
Currently test the only available function which is hs_dos_can_send_intro2() within the HS anti-DoS subsystem. Closes #15516 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Aug 01, 2019
-
-
Nick Mathewson authored
This makes all of the practracker tests get run by make check, and hence by our CI. Closes ticket 31304.
-
- Jun 15, 2019
-
-
Nick Mathewson authored
This set of tests gets the line coverage to 100%.
-
- Jun 11, 2019
-
-
David Goulet authored
Closes #30687. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Jun 05, 2019
-
-
Mike Perry authored
This reverts commit 41b94722.
-
- May 31, 2019
-
-
David Goulet authored
For now, only tests HS circuit repurpose function. Part of #29034 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- May 23, 2019
-
-
Nick Mathewson authored
Because it invokes the Tor mainloop, it does unpredictable things to test coverage of a lot of code that it doesn't actually test at all. (It is more an integration test than anything else.)
-
- May 02, 2019
-
-
Nick Mathewson authored
This mechanism isn't perfect, and sometimes it will guess wrong, but it will help our automation.
-
- Apr 30, 2019
-
-
We had this previously, but we did it differently in different places. This implementation is pulled from test_prob_distr.c
-
- Apr 29, 2019
-
-
David Goulet authored
Part of #26288 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Apr 24, 2019
-
-
teor authored
In "make test-network-all", test IPv6-only v3 single onion services, using the chutney network single-onion-v23-ipv6-md. This test will not pass until 23588 has been merged. Closes ticket 27251.
-
- Mar 25, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This "publish/subscribe" layer sits on top of lib/dispatch, and tries to provide more type-safety and cross-checking for the lower-level layer. Even with this commit, we're still not done: more checking will come in the next commit, and a set of usability/typesafety macros will come after.
-
Nick Mathewson authored
This module implements a way to send messages from one module to another, with associated data types. It does not yet do anything to ensure that messages are correct, that types match, or that other forms of consistency are preserved.
-
Nick Mathewson authored
We'll be using this for four kinds of identifier in dispatch.c
-
- Mar 20, 2019
-
-
rl1987 authored
-
- Feb 25, 2019
-
-
rl1987 authored
-
- Feb 21, 2019
-
-
Nick Mathewson authored
boklm tracked this down, and it doesn't make sense. It caused This change goes back to the previous LDFLAGS line.
-
- Feb 16, 2019
-
-
Neel Chauhan authored
-
- Feb 14, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
test_crypto.c is pretty big; it wouldn't hurt to split it up some more before I start adding stuff to the PRNG tests.
-
- Jan 02, 2019
-
-
George Kadianakis authored
This project introduces the prob_distr.c subsystem which implements all the probability distributions that WTF-PAD needs. It also adds unittests for all of them. Code and tests courtesy of Riastradh. Co-authored-by:
Taylor R Campbell <campbell+tor@mumble.net> Co-authored-by:
Mike Perry <mikeperry-git@torproject.org>
-
George Kadianakis authored
Co-authored-by:
George Kadianakis <desnacked@riseup.net>
-
- Dec 21, 2018
-
-
Part of ticket 27617.
-
- Dec 18, 2018
-
-
rl1987 authored
Ignore the address value instead of failing with error condition in case unrecognized address type is found.
-
- Dec 17, 2018
-
-
This patch removes the old process_handle_t code. Everything should by now be using the process_t interface. See: https://bugs.torproject.org/28179
-
This patch adds test cases for process_t which uses Tor's main loop. This allows us to test that the callbacks are actually invoked by the main loop when we expect them. See: https://bugs.torproject.org/28179
-
This patch adds a new Process subsystem for running external programs in the background of Tor. The design is focused around a new type named `process_t` which have an API that allows the developer to easily write code that interacts with the given child process. These interactions includes: - Easy API for writing output to the child process's standard input handle. - Receive callbacks whenever the child has output on either its standard output or standard error handles. - Receive callback when the child process terminates. We also support two different "protocols" for handling output from the child process. The default protocol is the "line" protocol where the process output callbacks will be invoked only when there is complete lines (either "\r\n" or "\n" terminated). We also support the "raw" protocol where the read callbacks will get whatever the operating system delivered to us in a single read operation. This patch does not include any operating system backends, but the Unix and Windows backends will be included in separate commits. See: https://bugs.torproject.org/28179
-
- Dec 03, 2018
-
-
Nick Mathewson authored
Additionally, use it to test that is_staledesc is set correctly. Eventually we'll want to test all the other flags, but I'm aiming for only adding coverage on the changed code here.
-
- Oct 29, 2018
-
-
Alex Crichton authored
This'll help retain test compatibility until 1.31.0 is released!
-
- Oct 16, 2018
-
-
rl1987 authored
-
- Oct 02, 2018
-
-
Alex Crichton authored
This is no longer necessary with upstream rust-lang/rust changes as well as some local tweaks. Namely: * The `-fsanitize=address`-style options are now passed via `-C link-args` through `RUSTFLAGS`. This obviates the need for the shell script. * The `-C default-linker-libraries`, disabling `-nodefaultlibs`, is passed through `RUSTFLAGS`, which is necessary to ensure that `-fsanitize=address` links correctly. * The `-C linker` option is passed to ensure we're using the same C compiler as normal C code, although it has a bit of hackery to only get the `gcc` out of `gcc -std=c99`
-