aboutsummaryrefslogtreecommitdiff
path: root/tests/data/Makefile.am
AgeCommit message (Collapse)Author
2013-03-10imap: Added test807 for custom request functionality (STORE)Jiri Hruska
2013-03-10imap: Added test806 for IMAP (folder) LIST commandJiri Hruska
2013-03-10imap: Added test805 for APPEND functionalityJiri Hruska
2013-03-10imap: Added test804 for skipping SELECT if in the same mailboxJiri Hruska
2013-03-10imap: Added test802 and test803 for UIDVALIDITY verificationJiri Hruska
Added one test for a request with matching UIDVALIDITY and one which is a mismatched request that will fail.
2013-03-10imap: Added test801 for UID and SECTION URL parametersJiri Hruska
2013-03-10Makefile.am: Corrected end of line filler characterSteve Holme
The majority of lines, that specify a test file for inclusion, end with a tab character before the slash whilst some end with a space. Corrected those that end with a space to end with a tab character as well.
2013-03-10email-tests: Renamed the IMAP test to be 800Steve Holme
Continued segregating the email protocol tests, into their own protocol based ranges, in preparation of adding more e-mail related tests to the test suite.
2013-03-10email-tests: Renamed the SMTP tests to be in the range 900-906Steve Holme
Continued segregating the email protocol tests, into their own protocol based ranges, in preparation of adding more e-mail related tests to the test suite.
2013-03-10email-tests: Renamed the POP3 tests to be in the range 850-857Steve Holme
Started segregating the email protocol tests, into their own protocol based ranges, in preparation of adding more e-mail related tests to the test suite.
2013-02-11SOCKS: fix socks proxy when noproxy matchedulion
Test 1212 added to verify Bug: http://curl.haxx.se/bug/view.cgi?id=1190
2013-02-10Fix NULL pointer reference when closing an unused multi handle.Linus Nielsen Feltzing
2013-02-08DONE: consider callback-aborted transfers prematureDaniel Stenberg
This bug report properly identified that when doing SMTP and aborting the transfer with a callback, it must be considered aborted prematurely by the code to avoid QUIT etc to be attempted as that would cause a hang. The new test case 1507 verifies this behavior. Reported by: Patricia Muscalu Bug: http://curl.haxx.se/bug/view.cgi?id=1184
2013-02-05CURLMOPT_MAXCONNECTS: restore functionalityLinus Nielsen Feltzing
When a connection is no longer used, it is kept in the cache. If the cache is full, the oldest idle connection is closed. If no connection is idle, the current one is closed instead.
2013-01-22formpost: support quotes, commas and semicolon in file namesUlion
- document the double-quote and backslash need be escaped if quoting. - libcurl formdata escape double-quote in filename by backslash. - curl formparse can parse filename both contains '"' and ',' or ';'. - curl now can uploading file with ',' or ';' in filename. Bug: http://curl.haxx.se/bug/view.cgi?id=1171
2013-01-03writeout: -w now supports remote_ip/port and local_ip/portDaniel Stenberg
Added mention to the curl.1 man page. Test case 1223 verifies remote_ip/port.
2013-01-03test 1222: 8 chars object name generation && test 1221: adjustmentsYang Tse
2013-01-02build and tests: curl_10char_object_name() shell functionYang Tse
lib/objnames.inc provides definition of curl_10char_object_name() shell function. The intended purpose of this function is to transliterate a (*.c) source file name that may be longer than 10 characters, or not, into a string with at most 10 characters which may be used as an OS/400 object name. Test case 1221 does unit testng of this function and also verifies that it is possible to generate distinct short object names for all curl and libcurl *.c source file names. lib/objnames-test.sh is the shell script used for test case 1221. tests/runtests.pl modified to accept shell script test cases. More details inside lib/objnames.inc and lib/objnames-test.sh
2012-12-25test 1504 and 1505: same as 1502 but with different cleanup sequencesYang Tse
2012-12-23test 1503: same as 1502 but with a different cleanup sequenceYang Tse
2012-11-18fixed memory leak: CURLOPT_RESOLVE with multi interfaceDaniel Stenberg
DNS cache entries populated with CURLOPT_RESOLVE were not properly freed again when done using the multi interface. Test case 1502 added to verify. Bug: http://curl.haxx.se/bug/view.cgi?id=3575448 Reported by: Alex Gruz
2012-11-17mem-include-scan: verify memory #includesDaniel Stenberg
If we use memory functions (malloc, free, strdup etc) in C sources in libcurl and we fail to include curl_memory.h or memdebug.h we either fail to properly support user-provided memory callbacks or the memory leak system of the test suite fails. After Ajit's report of a failure in the first category in http_proxy.c, I spotted a few in the second category as well. These problems are now tested for by test 1132 which runs a perl program that scans for and attempts to check that we use the correct include files if a memory related function is used in the source code. Reported by: Ajit Dhumale Bug: http://curl.haxx.se/mail/lib-2012-11/0125.html
2012-11-06test1413: verify redirects to URLs with fragmentsDaniel Stenberg
The bug report claimed it didn't work. This problem was probably fixed in 473003fbdf. Bug: http://curl.haxx.se/bug/view.cgi?id=3581898
2012-11-06test1412: verify Digest with repeated URLsDaniel Stenberg
This test case verifies that bug 3582718 is fixed. Bug: http://curl.haxx.se/bug/view.cgi?id=3582718 Reported by: Nick Zitzmann (originally)
2012-11-04FTP: prevent the multi interface from blockingDaniel Stenberg
As pointed out in Bug report #3579064, curl_multi_perform() would wrongly use a blocking mechanism internally for some commands which could lead to for example a very long block if the LIST response never showed. The solution was to make sure to properly continue to use the multi interface non-blocking state machine. The new test 1501 verifies the fix. Bug: http://curl.haxx.se/bug/view.cgi?id=3579064 Reported by: Guido Berhoerster
2012-09-04test1411: verify SMTP without SIZE supportDaniel Stenberg
2012-09-01Unit test for curl_multi_wait()Sara Golemon
2012-08-31NTLM: verify multiple connections workJoe Mason
Add test2032 to test that NTLM does not switch connections in the middle of the handshake
2012-08-03Add tests of auth retriesJoe Mason
2012-07-12tests: verify the stricter numeric option parserDaniel Stenberg
Test 1409 and 1410 verifies the stricter numeric option parser introduced the other day in commit f2b6ebed7b.
2012-07-02configure.ac: verify that libmetalink is new enoughYang Tse
Enabling test2017 to test2022.
2012-06-27tests: add five more Metalink test casesYang Tse
2012-06-24test: Added test HTTP receive cookies over IPv6Ghennadi Procopciuc
2012-06-22tests: add another Metalink test caseYang Tse
2012-06-21tests: add six Metalink test casesYang Tse
2012-06-21tests: Added Metalink test case # 2005Tatsuhiro Tsujikawa
2012-06-07tests 1364 to 1393: several -o filename -J -i -D combinations for HTTP and FTPYang Tse
2012-06-04tests 1356 to 1363: several -O -J -i -D combinations with FTP protocolYang Tse
Currently 1356 to 1362 succeed but a write failure is logged in traceNNNN. Currently 1363 fails, so disabled for now.
2012-06-04tests 1348 to 1355: several -O -J -i -D combinations with FTP protocolYang Tse
Currently 1348 to 1354 succeed but a write failure is logged in traceNNNN. Currently 1355 fails, so disabled for now.
2012-06-04tests 1346 to 1347: several -O -J -i -D combinations with HTTP protocolYang Tse
2012-06-01tests 1334 to 1345: several -O -J -i -D combinations with HTTP protocolYang Tse
2012-04-20HTTP: empty chunked POST ended up in two zero size chunksDaniel Stenberg
When doing a chunked-encoded POST with -d (CURLOPT_POSTFIELDS) and the size of the POST was zero length, it made libcurl first send a zero chunk and then the terminating one. This could confuse a receiver and it should rather just send the terminating chunk as it does with this fix. Test case 1333 is added to verify. Bug: http://curl.haxx.se/mail/archive-2012-04/0060.html Reported by: Arnaud Compan
2012-04-05test: added test 1332 that tests --post303Daniel Stenberg
2012-04-05test1331: cookies on a 407 responseDaniel Stenberg
Verify that cookies are sent back even after a 407 response has been received
2012-04-01HTTP: reset expected DL/UL sizes on redirectsDaniel Stenberg
With FOLLOWLOCATION enabled. When a 3xx page is downloaded and the download size was known (like with a Content-Length header), but the subsequent URL (transfered after the 3xx page) was chunked encoded, then the previous "known download size" would linger and cause the progress meter to get incorrect information, ie the former value would remain being sent in. This could easily result in downloads that were WAY larger than "expected" and would cause >100% outputs with the curl command line tool. Test case 599 was created and it was used to repeat the bug and then verify the fix. Bug: http://curl.haxx.se/bug/view.cgi?id=3510057 Reported by: Michael Wallner
2012-03-22test #598: add to Makefile.amYang Tse
2012-02-23Add tests for curl's --libcurl output.Colin Hogben
These tests check the output of the --libcurl option of curl, including the improved option handling added in a related patch.
2012-02-10parse_proxy: bail out on zero-length proxy names!Daniel Stenberg
The proxy parser function strips off trailing slashes off the proxy name which could lead to a mistaken zero length proxy name which would be treated as no proxy at all by subsequent functions! This is now detected and an error is returned. Verified by the new test 1329. Reported by: Chandrakant Bagul Bug: http://curl.haxx.se/mail/lib-2012-02/0000.html
2012-02-06curl tool: don't abort glob-loop due to failuresDaniel Stenberg
We want to continue to the next URL to try even on failures returned from libcurl. This makes -f with ranges still get subsequent URLs even if occasional ones return error. This was a regression as it used to work and broke in the 7.23.0 release. Added test case 1328 to verify the fix. Bug: http://curl.haxx.se/bug/view.cgi?id=3481223 Reported by: Juan Barreto
2012-01-24tests: test CRLF in URLsDaniel Stenberg
Related to the security vulnerability: CVE-2012-0036 Bug: http://curl.haxx.se/docs/adv_20120124.html