aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/ipv6
Commit message (Collapse)AuthorAgeFilesLines
* testing: Globally define logging via syslog for charon-systemdTobias Brunner2017-11-1545-418/+8
| | | | | | | We could make the same change for charon (actually setting it for charon in strongswan.conf.testing would work for charon-systemd too), however, there are dozens of test cases that currently set charondebug in ipsec.conf.
* testing: Converted ipv6/rw-ip6-in-ip4-ikev2 to swanctlAndreas Steffen2017-11-1014-96/+158
|
* testing: Converted ipv6/rw-ip6-in-ip4-ikev1 to swanctlAndreas Steffen2017-11-1014-96/+158
|
* testing: Converted ipv6/net2net-ip6-in-ip4-ikev2 to swanctlAndreas Steffen2017-11-1011-66/+113
|
* testing: Converted ipv6/net2net-ip6-in-ip4-ikev1 to swanctlAndreas Steffen2017-11-1011-63/+112
|
* testing: Converted ipv6/rw-rfc3779-ikev2 to swanctlAndreas Steffen2017-11-1022-103/+161
|
* testing: Converted ipv6/rw-compress-ikev2 to swanctlAndreas Steffen2017-11-1010-64/+109
|
* testing: Converted ipv6/rw-psk-ikev2 to swanctlAndreas Steffen2017-11-1017-96/+174
|
* testing: Converted ipv6/rw-psk-ikev1 to swanctlAndreas Steffen2017-11-1017-96/+175
|
* testing: Converted ipv6/rw-ikev2 to swanctlAndreas Steffen2017-11-1014-104/+163
|
* testing: Converted ipv6/rw-ikev1 to swanctlAndreas Steffen2017-11-1014-107/+160
|
* testing: Converted ipv6/net2net-rfc3779-ikev2 to swanctlAndreas Steffen2017-11-1017-88/+128
|
* testing: Converted ipv6/net2net-ip4-in-ip6-ikev2 to swanctlAndreas Steffen2017-11-1010-78/+117
|
* testing: Converted ipv6/net2net-ip4-in-ip6-ikev1 to swanctlAndreas Steffen2017-11-1010-78/+113
|
* testing: Converted ipv6/transport-ikev2 to swanctlAndreas Steffen2017-11-1011-76/+116
|
* testing: Converted ipv6/transport-ikev1 to swanctlAndreas Steffen2017-11-1011-75/+112
|
* testing: Converted ipv6/net2net-ikev2 to swanctlAndreas Steffen2017-11-1011-84/+119
|
* testing: Converted ipv6/net2net-ikev1 to swanctlAndreas Steffen2017-11-1011-82/+118
|
* testing: Converted ipv6/host2host-ikev2 to swanctlAndreas Steffen2017-11-1011-83/+115
|
* testing: Converted ipv6/host2host-ikev1 to swanctlAndreas Steffen2017-11-1011-86/+111
|
* testing: make curve25519 the default DH groupAndreas Steffen2016-11-1445-45/+45
|
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-162-2/+2
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Fix CRL URIs in ipv6/net2net-ip4-in-ip6-ikev* scenariosTobias Brunner2015-11-092-2/+2
|
* testing: Actually send an uncompressed packet in the ipv6/rw-compress-ikev2 ↵Tobias Brunner2015-10-061-1/+2
| | | | | | | | | | | | | | | | | | | | | | scenario The default of 56 bytes already exceeds the threshold of 90 bytes (8 bytes ICMP + 40 bytes IPv6 = 104 bytes). By reducing the size we make sure the packet is not compressed (40 + 8 + 40 = 88). This also fixes a strange failure of this scenario due to the recently added post-test `ip xfrm state` check. The kernel stores a reference to the used SAs on the inbound skbuffs and since these are garbage collected it could take a while until all references to an SA disappear and the SA is finally destroyed. But while SAs might not get destroyed immediately when we delete them, they are actually marked as dead and therefore won't show up in `ip xfrm state`. However, that's not the case for the tunnel SAs the kernel attaches to IPComp SAs, which we don't explicitly delete, and which aren't modified by the kernel until the IPComp SA is destroyed. So what happened when the last ping unintentionally got compressed is that the skbuff had a reference to the IPComp SA and therefore the tunnel SA. This skbuff often was destroyed after the `ip xfrm state` check ran and because the tunnel SA would still get reported the test case failed.
* tests: Introduced IPV6 flag in tests.confAndreas Steffen2015-07-2119-0/+76
|
* Updated RFC3779 certificates5.2.2Andreas Steffen2014-12-2810-213/+213
|
* Increased fragment size to 1400 in ipv6/net2net-ikev1 scenario5.2.1Andreas Steffen2014-10-182-2/+2
|
* Enabled IKEv2 fragmentation in ipv6/net2net-ikev2 scenarioAndreas Steffen2014-10-184-2/+6
|
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-2439-39/+39
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Add ipv6/rw-compress-ikev2 scenarioTobias Brunner2014-01-239-0/+125
|
* 5.1.0 changes for test casesAndreas Steffen2013-06-2922-0/+33
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-1718-54/+54
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-1718-36/+36
|
* converted all ipv6 iptables/ip6tables scenariosAndreas Steffen2013-01-1794-4619/+380
|
* Add expect-connection guest image scriptReto Buerki2013-01-1719-38/+46
| | | | | | | | This script can be used in pretest.dat files to wait until an IPsec connection becomes available. This avoids unconditional sleeps and improves test performance. The ipv6 tests have been updated to use the expect-connection script.
* Adapt test configurationsReto Buerki2013-01-172-2/+2
| | | | Adapt test configurations to the new Debian-based system.
* fixed typoAndreas Steffen2012-06-201-1/+1
|
* added ipv6/rw-ip6-in-ip4-ikev1 scenarioAndreas Steffen2012-06-2019-0/+504
|
* added ipv6/rw-ip6-in-ip4-ikev2 scenarioAndreas Steffen2012-06-2014-0/+440
|
* removed plutostart parameterAndreas Steffen2012-06-1337-37/+0
|
* upgraded ipv6 scenarios to 5.0.0Andreas Steffen2012-05-29121-282/+737
|
* define explicit IKEv1 keyexchange mode IIIAndreas Steffen2010-10-1410-0/+10
|
* testing: Adding kernel-netlink to pluto.load statements.Tobias Brunner2010-09-022-2/+2
|
* all x509 based ipv6/*-ikev2 scenarios require the revocation pluginAndreas Steffen2010-07-1518-18/+18
|
* Added addrblock plugin to RFC3779 test casesMartin Willi2010-07-135-5/+5
|
* Adding socket-default to the plugin list in all test cases.Tobias Brunner2010-03-0921-21/+21
|
* hash-and-url avoids IP fragementation, cert and crl fetch based on IPv6Andreas Steffen2010-02-0626-48/+82
|
* hash-and-url avoids IP fragementation, cert and crl fetch based on IPv6Andreas Steffen2010-02-066-12/+20
|
* hash-and-url avoids IP fragmentation, cert and crl fetch based on IPv6Andreas Steffen2010-02-056-12/+20
|
* IPv6 fragment and http access are not needed in PSK scenarioAndreas Steffen2010-02-054-21/+1
|