Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | testing: Add ikev2/net2net-fragmentation scenario | Tobias Brunner | 2014-10-10 | 9 | -0/+116 |
| | |||||
* | Updated revoked certificate in ikev2/ocsp-revoked scenario | Andreas Steffen | 2014-10-05 | 2 | -42/+42 |
| | |||||
* | The critical-extension scenarios need the old private keys | Andreas Steffen | 2014-10-05 | 2 | -0/+54 |
| | |||||
* | testing: Make sure the whitelist plugin is ready before configuring it | Tobias Brunner | 2014-10-03 | 1 | -1/+3 |
| | |||||
* | testing: Update PKCS#12 containers | Tobias Brunner | 2014-10-03 | 2 | -0/+0 |
| | |||||
* | testing: Update PKCS#8 keys | Tobias Brunner | 2014-10-03 | 3 | -81/+81 |
| | |||||
* | testing: Update public keys in DNSSEC scenarios | Tobias Brunner | 2014-10-03 | 3 | -0/+0 |
| | | | | | The tests are successful even if the public keys are not stored locally, but an additional DNS query is required to fetch them. | ||||
* | testing: Update carols certificate in several test cases | Tobias Brunner | 2014-10-03 | 2 | -43/+43 |
| | |||||
* | testing: Add some notes about how to reissue attribute certificates | Martin Willi | 2014-10-03 | 3 | -0/+61 |
| | |||||
* | testing: Reissue attribute certificates for the new holder certificates | Martin Willi | 2014-10-03 | 8 | -72/+72 |
| | | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests. | ||||
* | configure: Load fetcher plugins after crypto base plugins | Martin Willi | 2014-09-24 | 321 | -321/+321 |
| | | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl. | ||||
* | Generated new test certificates | Andreas Steffen | 2014-08-28 | 2 | -42/+42 |
| | |||||
* | testing: Add pfkey/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 1 | -0/+2 |
| | |||||
* | testing: Add ikev2/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-19 | 12 | -0/+171 |
| | |||||
* | testing: Remove ikev2/shunt-policies scenario | Tobias Brunner | 2014-06-19 | 10 | -166/+0 |
| | | | | | This scenario doesn't really apply anymore (especially its use of drop policies). | ||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 2 | -42/+42 |
| | |||||
* | testing: Run 'conntrack -F' before all test scenarios | Tobias Brunner | 2014-04-02 | 18 | -27/+4 |
| | | | | This prevents failures due to remaining conntrack entries. | ||||
* | Test TLS AEAD cipher suites | Andreas Steffen | 2014-04-01 | 7 | -4/+13 |
| | |||||
* | Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenario | Andreas Steffen | 2014-03-31 | 1 | -1/+1 |
| | |||||
* | revocation: Restrict OCSP signing to specific certificates | Martin Willi | 2014-03-31 | 2 | -3/+2 |
| | | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally. | ||||
* | testing: Add an acert test that forces a fallback connection based on groups | Martin Willi | 2014-03-31 | 13 | -0/+199 |
| | |||||
* | testing: Add an acert test case sending attribute certificates inline | Martin Willi | 2014-03-31 | 18 | -0/+291 |
| | |||||
* | testing: Add an acert test using locally cached attribute certificates | Martin Willi | 2014-03-31 | 16 | -0/+239 |
| | |||||
* | Renewed self-signed OCSP signer certificate | Andreas Steffen | 2014-03-27 | 2 | -28/+28 |
| | |||||
* | Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵ | Andreas Steffen | 2014-03-24 | 1 | -0/+4 |
| | | | | scenario | ||||
* | Updated expired certificates issued by the Research and Sales Intermediate CAs | Andreas Steffen | 2014-03-24 | 4 | -87/+87 |
| | |||||
* | Renewed revoked Research CA certificate5.1.3dr1 | Andreas Steffen | 2014-03-22 | 1 | -9/+9 |
| | |||||
* | Completed integration of ntru_crypto library into ntru plugin | Andreas Steffen | 2014-03-22 | 9 | -0/+128 |
| | |||||
* | Merged libstrongswan options into charon section | Andreas Steffen | 2014-03-15 | 20 | -51/+4 |
| | |||||
* | Added ikev2/lookip scenario | Andreas Steffen | 2014-02-17 | 11 | -0/+149 |
| | |||||
* | testing: Use installed SQL schema instead of local copy | Tobias Brunner | 2014-02-12 | 5 | -11/+11 |
| | |||||
* | testing: Add ikev2/host2host-transport-nat scenario | Tobias Brunner | 2014-01-23 | 9 | -0/+146 |
| | |||||
* | testing: Add ikev2/compress-nat scenario | Tobias Brunner | 2014-01-23 | 12 | -0/+187 |
| | |||||
* | testing: Enable firewall for ikev2/compress scenario | Tobias Brunner | 2014-01-23 | 8 | -7/+14 |
| | | | | | Additionally, send a regular (small) ping as the kernel does not compress small packets and handles those differently inbound. | ||||
* | Any of the four NTRU parameter sets can be selected | Andreas Steffen | 2013-11-27 | 1 | -0/+8 |
| | |||||
* | Added ikev2/net2net-ntru-cert and ikev2/rw-ntru-psk scenarios | Andreas Steffen | 2013-11-27 | 23 | -0/+284 |
| | |||||
* | testing: Add ikev2/net2net-dnscert scenario | Tobias Brunner | 2013-10-11 | 15 | -0/+224 |
| | |||||
* | testing: Add an IKEv2 host2host AH transport mode test case | Martin Willi | 2013-10-11 | 9 | -0/+89 |
| | |||||
* | testing: Add an IKEv2 net2net AH test case | Martin Willi | 2013-10-11 | 9 | -0/+101 |
| | |||||
* | testing: Don't load certificates explicitly and delete CA certificates in ↵ | Tobias Brunner | 2013-07-15 | 3 | -2/+3 |
| | | | | | | PKCS#12 scenarios Certificates are now properly extracted from PKCS#12 files. | ||||
* | Added ikev2/net2net-pkcs12 scenario | Andreas Steffen | 2013-07-10 | 13 | -0/+116 |
| | |||||
* | conntrack -F makes ikev2/nat-rw scenario to work always | Andreas Steffen | 2013-07-10 | 1 | -0/+1 |
| | |||||
* | dhcp: Use chunk_hash_static() to calculate ID-based MAC addresses | Tobias Brunner | 2013-06-28 | 2 | -4/+4 |
| | |||||
* | Load any type (RSA/ECDSA) of public key via left|rightsigkey | Tobias Brunner | 2013-05-07 | 9 | -13/+13 |
| | |||||
* | left|rightrsasigkey accepts SSH keys but the key format has to be specified ↵ | Tobias Brunner | 2013-05-07 | 4 | -6/+6 |
| | | | | | | | explicitly The default is now PKCS#1. With the dns: and ssh: prefixes other formats can be selected. | ||||
* | disable reauth, too | Andreas Steffen | 2013-04-15 | 1 | -1/+2 |
| | |||||
* | Added charon.initiator_only option which causes charon to ignore IKE ↵ | Andreas Steffen | 2013-04-14 | 11 | -0/+132 |
| | | | | initiation requests by peers | ||||
* | Added Framed-IP-Address information to RADIUS accounting records | Andreas Steffen | 2013-03-22 | 2 | -0/+2 |
| | |||||
* | Added ikev2/rw-eap-framed-ip-radius scenario | Andreas Steffen | 2013-03-22 | 19 | -0/+266 |
| | |||||
* | Added ikev2/ip-two-pools-v4v6-db scenario | Andreas Steffen | 2013-03-22 | 9 | -0/+110 |
| |