On 02/10/2012 08:20 AM, Jakob Schlyter wrote:
> On 7 feb 2012, at 22:08, Ondrej Mikle wrote:
>
>> 1. full packet might leak identifying information about OS or resolver used,
>> quoting Nick:
>>> There are parts of a DNS packet that we wouldn't want
>>> to have the Tor client make up. For example
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02/12/2012 01:57 AM, Nathan Freitas wrote:
> I am going to sleep on this now a bit, do some more testing
> tomorrow, post a public build, then ideally about 18 hours from
> now, put a build up for release for Iranian users.
I've posted a signed tes
On Sun, 12 Feb 2012 04:28:38 +0100, Nick Mathewson
wrote:
On Sat, Feb 11, 2012 at 7:12 AM, Esteban Manchado Velázquez
wrote:
Hi there,
I'm done with the first batch of work on the test side. You have the
(rebased just now) work here:
https://github.com/emanchado/tor/commits/master.
A sug
On 12 Feb 2012, at 03:28, Nick Mathewson wrote:
>> 2. In comparison assertions, the general convention seems to be to place the
>> expected value first ("test_eq(0, functioncall(...))" rather than
>> "test_eq(functioncall(...), 0)"). I have modified the assertions not
>> following that convention,