aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/sql/multi-level-ca
Commit message (Collapse)AuthorAgeFilesLines
* testing: Globally define logging via syslog for charon-systemdTobias Brunner2017-11-153-24/+0
| | | | | | | We could make the same change for charon (actually setting it for charon in strongswan.conf.testing would work for charon-systemd too), however, there are dozens of test cases that currently set charondebug in ipsec.conf.
* testing: Converted sql to systemdAndreas Steffen2017-11-115-6/+33
|
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-161-2/+2
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-051-4/+4
|
* testing: Use absolute path to the _updown script in SQL scenariosTobias Brunner2016-02-173-3/+3
| | | | | | /usr/local/sbin is not included in PATH set by the charon init script and since the ipsec script is obsolete when using swanctl it makes sense to change this anyway.
* testing: Change sql scenarios to swanctlAndreas Steffen2016-01-0310-24/+27
|
* testing: Reduce runtime of all tests that use SQLite databases by storing ↵Tobias Brunner2015-11-096-13/+13
| | | | them in ramfs
* testing: Remove nearly all sleep calls from pretest and posttest scriptsTobias Brunner2015-11-091-1/+2
| | | | | By consistently using the `expect-connection` helper we can avoid pretty much all previously needed calls to sleep.
* testing: Updated carol's certificate from research CA and dave's certificate ↵5.3.1dr1Andreas Steffen2015-04-262-7/+6
| | | | from sales CA
* testing: Updated certificates and keys in sql scenariosAndreas Steffen2014-10-063-6/+6
|
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-243-3/+3
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Use installed SQL schema instead of local copyTobias Brunner2014-02-121-3/+3
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-171-3/+3
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-171-2/+2
|
* converted all sql iptables scenariosAndreas Steffen2013-01-172-6/+6
|
* Adapt test configurationsReto Buerki2013-01-171-2/+2
| | | | Adapt test configurations to the new Debian-based system.
* removed plutostart parameterAndreas Steffen2012-06-133-3/+0
|
* load nonce pluginAndreas Steffen2012-05-233-3/+3
|
* upgraded sql scenarios to 5.0.0Andreas Steffen2012-05-052-12/+17
|
* removed xcbc plugin from sql scenariosAndreas Steffen2011-11-013-3/+3
|
* added sql/multi-level-ca scenarioAndreas Steffen2010-12-0517-0/+683