aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/gcrypt-ikev2/rw-cert/hosts/dave
Commit message (Collapse)AuthorAgeFilesLines
* testing: Globally define logging via syslog for charon-systemdTobias Brunner2017-11-151-10/+1
| | | | | | | We could make the same change for charon (actually setting it for charon in strongswan.conf.testing would work for charon-systemd too), however, there are dozens of test cases that currently set charondebug in ipsec.conf.
* testing: Converted gcrypt-ikev2 to swanctlAndreas Steffen2017-11-103-24/+41
|
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-241-1/+1
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* Merged libstrongswan options into charon sectionAndreas Steffen2014-03-151-2/+0
|
* removed plutostart parameterAndreas Steffen2012-06-131-1/+0
|
* load nonce pluginAndreas Steffen2012-05-231-1/+1
|
* upgraded gcrypt-ikev2 scenarios to 5.0.0Andreas Steffen2012-05-061-3/+2
|
* added ctr ccm and gcm plugins to gcrypt-ikev2/rw-cert scenarioAndreas Steffen2010-08-291-1/+1
|
* all x509 based gcrypt-ikev2 scenarios require the revocation pluginAndreas Steffen2010-07-151-1/+1
|
* Adding socket-default to the plugin list in all test cases.Tobias Brunner2010-03-091-1/+1
|
* tests load pem/pkcs1 plugins, pubkey plugin not needed anymoreMartin Willi2009-08-261-1/+1
|
* enable integrity test in all rw-cert scenariosAndreas Steffen2009-07-171-0/+1
|
* moved alg-serpent and alg-twofish scenarios to gcrypt-ikev1Andreas Steffen2009-06-182-0/+36