aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/sql/rw-eap-aka-rsa
Commit message (Collapse)AuthorAgeFilesLines
* testing: Globally define logging via syslog for charon-systemdTobias Brunner2017-11-152-16/+0
| | | | | | | We could make the same change for charon (actually setting it for charon in strongswan.conf.testing would work for charon-systemd too), however, there are dozens of test cases that currently set charondebug in ipsec.conf.
* testing: Converted sql to systemdAndreas Steffen2017-11-114-4/+22
|
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-161-1/+1
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-051-2/+2
|
* testing: Use absolute path to the _updown script in SQL scenariosTobias Brunner2016-02-172-2/+2
| | | | | | /usr/local/sbin is not included in PATH set by the charon init script and since the ipsec script is obsolete when using swanctl it makes sense to change this anyway.
* testing: Change sql scenarios to swanctlAndreas Steffen2016-01-038-15/+17
|
* testing: Reduce runtime of all tests that use SQLite databases by storing ↵Tobias Brunner2015-11-095-9/+10
| | | | them in ramfs
* testing: Remove nearly all sleep calls from pretest and posttest scriptsTobias Brunner2015-11-091-1/+1
| | | | | By consistently using the `expect-connection` helper we can avoid pretty much all previously needed calls to sleep.
* testing: Update test conditions because signature schemes are now loggedTobias Brunner2015-03-041-1/+1
| | | | | RFC 7427 signature authentication is now used between strongSwan hosts by default, which causes the actual signature schemes to get logged.
* testing: Updated certificates and keys in sql scenariosAndreas Steffen2014-10-062-5/+5
|
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-241-1/+1
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Use installed SQL schema instead of local copyTobias Brunner2014-02-121-2/+2
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-171-3/+3
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-171-2/+2
|
* converted all sql iptables scenariosAndreas Steffen2013-01-172-4/+4
|
* Adapt test configurationsReto Buerki2013-01-171-1/+1
| | | | Adapt test configurations to the new Debian-based system.
* removed plutostart parameterAndreas Steffen2012-06-132-2/+0
|
* load nonce pluginAndreas Steffen2012-05-232-2/+2
|
* upgraded sql scenarios to 5.0.0Andreas Steffen2012-05-053-7/+5
|
* removed xcbc plugin from sql scenariosAndreas Steffen2011-11-012-2/+2
|
* Fixed common misspellings.Tobias Brunner2011-07-201-1/+1
| | | | Mostly found by 'codespell'.
* all x509 based sql scenarios require the revocation pluginAndreas Steffen2010-07-152-2/+2
|
* fixed keyids in sql/rw-eap-aka-rsa scenarioAndreas Steffen2010-05-152-11/+35
|
* Adding socket-default to the plugin list in all test cases.Tobias Brunner2010-03-092-2/+2
|
* Streamlined EAP plugins to use a dash between eap-method, as used in all ↵Martin Willi2009-10-154-10/+10
| | | | other places
* sql/rw-eap-aka-rsa scenario requires eapaka-3gpp2 pluginAndreas Steffen2009-10-122-2/+2
|
* CA certificates are looked up using the subjectPublicKeyInfo keyidMartin Willi2009-09-212-2/+2
|
* updated to renewed certs in SQL databaseAndreas Steffen2009-09-181-3/+3
|
* use subjectPublicKeyInfo hash for CA certificate lookupMartin Willi2009-09-012-2/+2
|
* keyids in SQL use ID_KEY_ID type with subjectPublicKey SHA1 hashMartin Willi2009-08-262-3/+3
|
* tests load pem/pkcs1 plugins, pubkey plugin not needed anymoreMartin Willi2009-08-262-2/+2
|
* merged multi-auth branch back into trunkMartin Willi2009-04-142-24/+6
|
* include updown plugin in sql scenariosAndreas Steffen2008-10-212-2/+2
|
* explicitly load kernel-netlink plugin in UML scenariosAndreas Steffen2008-10-072-2/+2
|
* adapted sql/rw-eap-aka-rsa scenario to new EAP identity typeAndreas Steffen2008-08-252-6/+24
|
* added sql/rw-eap-aka-rsa scenarioAndreas Steffen2008-06-3013-0/+381