Nmap Development mailing list archives

ncat-test.pl finally under control


From: David Fifield <david () bamsoftware com>
Date: Tue, 28 Jul 2009 13:11:16 -0600

For a long time now, Ncat has had a test program called ncat-test.pl
that checks various aspects of its operation for correctness, especially
things like --deny and --allow that relate to security. For an almost
equally long time, the test program has been mostly useless, because it
contained for features that are not implemented and tests would randomly
fail because of timing issues.

All that has been sorted out, so you should try running ncat-test.pl and
see if all the tests either PASS or XFAIL on your system. (XFAIL,
expected fail, is for tests of features that should be implemented but
are not yet.)

$ cd ncat/test
$ ./ncat-test.pl
PASS Server default listen address and port
PASS Server default port
PASS Server default listen address
PASS Server sends EOF after client disconnect (tcp)
PASS Server sends EOF after client disconnect (sctp)
PASS Server sends EOF after client disconnect (tcp ssl)
PASS Server sends EOF after client disconnect (sctp ssl)
PASS --keep-open
PASS -C translation on input (tcp)
PASS -C translation on input (udp)
PASS -C translation on input (sctp)
PASS -C translation on input (tcp ssl)
PASS -C translation on input (sctp ssl)
...
PASS --max-conns 10 with exec (tcp)
PASS --max-conns 10 with exec (sctp)
XFAIL --max-conns 10 with exec (udp xfail)
XFAIL --max-conns 10 with exec (tcp ssl xfail)
XFAIL --max-conns 10 with exec (sctp ssl xfail)
17 expected failures.
0 unexpected failures.
208 tests total.

Please report any unexpected failures.

There's another set of tests that test internal functions. Run those by
running "make check" in the ncat directory. These tests handle --allow
and --deny set matching, URI parsing, command line splitting, and
wildcard certificate matching.

David Fifield

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: