aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/ipv6
Commit message (Collapse)AuthorAgeFilesLines
* testing: Actually send an uncompressed packet in the ipv6/rw-compress-ikev2 ↵Tobias Brunner2015-10-061-1/+2
| | | | | | | | | | | | | | | | | | | | | | scenario The default of 56 bytes already exceeds the threshold of 90 bytes (8 bytes ICMP + 40 bytes IPv6 = 104 bytes). By reducing the size we make sure the packet is not compressed (40 + 8 + 40 = 88). This also fixes a strange failure of this scenario due to the recently added post-test `ip xfrm state` check. The kernel stores a reference to the used SAs on the inbound skbuffs and since these are garbage collected it could take a while until all references to an SA disappear and the SA is finally destroyed. But while SAs might not get destroyed immediately when we delete them, they are actually marked as dead and therefore won't show up in `ip xfrm state`. However, that's not the case for the tunnel SAs the kernel attaches to IPComp SAs, which we don't explicitly delete, and which aren't modified by the kernel until the IPComp SA is destroyed. So what happened when the last ping unintentionally got compressed is that the skbuff had a reference to the IPComp SA and therefore the tunnel SA. This skbuff often was destroyed after the `ip xfrm state` check ran and because the tunnel SA would still get reported the test case failed.
* tests: Introduced IPV6 flag in tests.confAndreas Steffen2015-07-2119-0/+76
|
* Updated RFC3779 certificates5.2.2Andreas Steffen2014-12-2810-213/+213
|
* Increased fragment size to 1400 in ipv6/net2net-ikev1 scenario5.2.1Andreas Steffen2014-10-182-2/+2
|
* Enabled IKEv2 fragmentation in ipv6/net2net-ikev2 scenarioAndreas Steffen2014-10-184-2/+6
|
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-2439-39/+39
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Add ipv6/rw-compress-ikev2 scenarioTobias Brunner2014-01-239-0/+125
|
* 5.1.0 changes for test casesAndreas Steffen2013-06-2922-0/+33
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-1718-54/+54
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-1718-36/+36
|
* converted all ipv6 iptables/ip6tables scenariosAndreas Steffen2013-01-1794-4619/+380
|
* Add expect-connection guest image scriptReto Buerki2013-01-1719-38/+46
| | | | | | | | This script can be used in pretest.dat files to wait until an IPsec connection becomes available. This avoids unconditional sleeps and improves test performance. The ipv6 tests have been updated to use the expect-connection script.
* Adapt test configurationsReto Buerki2013-01-172-2/+2
| | | | Adapt test configurations to the new Debian-based system.
* fixed typoAndreas Steffen2012-06-201-1/+1
|
* added ipv6/rw-ip6-in-ip4-ikev1 scenarioAndreas Steffen2012-06-2019-0/+504
|
* added ipv6/rw-ip6-in-ip4-ikev2 scenarioAndreas Steffen2012-06-2014-0/+440
|
* removed plutostart parameterAndreas Steffen2012-06-1337-37/+0
|
* upgraded ipv6 scenarios to 5.0.0Andreas Steffen2012-05-29121-282/+737
|
* define explicit IKEv1 keyexchange mode IIIAndreas Steffen2010-10-1410-0/+10
|
* testing: Adding kernel-netlink to pluto.load statements.Tobias Brunner2010-09-022-2/+2
|
* all x509 based ipv6/*-ikev2 scenarios require the revocation pluginAndreas Steffen2010-07-1518-18/+18
|
* Added addrblock plugin to RFC3779 test casesMartin Willi2010-07-135-5/+5
|
* Adding socket-default to the plugin list in all test cases.Tobias Brunner2010-03-0921-21/+21
|
* hash-and-url avoids IP fragementation, cert and crl fetch based on IPv6Andreas Steffen2010-02-0626-48/+82
|
* hash-and-url avoids IP fragementation, cert and crl fetch based on IPv6Andreas Steffen2010-02-066-12/+20
|
* hash-and-url avoids IP fragmentation, cert and crl fetch based on IPv6Andreas Steffen2010-02-056-12/+20
|
* IPv6 fragment and http access are not needed in PSK scenarioAndreas Steffen2010-02-054-21/+1
|
* hash-and-url avoids IP fragmentation, cert and crl fetch based on IPv6Andreas Steffen2010-02-057-12/+21
|
* IPv6 frag netfilter rule not needed anymoreAndreas Steffen2010-02-052-6/+0
|
* hash-and-url avoids IP fragmentation, cert and crl fetch based on IPv6Andreas Steffen2010-02-057-6/+21
|
* removed charon-specific load statement in pluto scenarioAndreas Steffen2009-12-262-10/+0
|
* added three RFC 3779 scenariosAndreas Steffen2009-12-2541-0/+1217
|
* firewall-enabled ipv6/net2net-ip6-in-ip4-ikev2 scenarioAndreas Steffen2009-12-178-38/+41
|
* firewall-enabled ipv6/net2net-ip4-in-ip6-ikev2 scenarioAndreas Steffen2009-12-176-4/+9
|
* added ipv6/net2net-ip4-in-ip6-ikev1 and ipv6/net2net-ip4-in-ip6-ikev1 scenariosAndreas Steffen2009-10-1622-0/+642
|
* tests load pem/pkcs1 plugins, pubkey plugin not needed anymoreMartin Willi2009-08-2616-16/+16
|
* loading updown plugin if requiredMartin Willi2008-10-1612-12/+12
|
* explicitly load kernel-netlink plugin in UML scenariosAndreas Steffen2008-10-0716-16/+16
|
* added ipv6/net2net-ip6-in-ip6-ikev2 scenarioAndreas Steffen2008-08-0622-1/+323
|
* define plugins to be loaded in strongswan.confAndreas Steffen2008-05-2814-0/+70
|
* fixed another transport mode evaltestAndreas Steffen2008-04-181-1/+1
|
* added ipv6/net2net-ipv4-ikev2 scenarioAndreas Steffen2008-04-189-0/+306
|
* add ip xfrm state test for ikev1 transport modeAndreas Steffen2007-12-191-0/+2
|
* added ipv6 transport mode scenarios for IKEv1 and IKEv2Andreas Steffen2007-12-1926-18/+595
|
* fixed typo in iptables scriptAndreas Steffen2007-11-1618-18/+18
|
* added rw-psk-ikev2 scenarioAndreas Steffen2007-11-1614-0/+452
|
* added rw-psk-ikev1 scenarioAndreas Steffen2007-11-1611-0/+295
|
* IPv6 scenarios now used the new IPv6 topology graphsAndreas Steffen2007-11-086-6/+6
|
* another four IPv6 scenarios fully demonstrate ip6tables firewall useAndreas Steffen2007-11-0832-11/+1109
|
* enabled ip6tables-based firewalling in first two IPv6 scenariosAndreas Steffen2007-11-0711-6/+415
|