aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
...
* Added tnc/tnccs-20-pt-tls scenarioAndreas Steffen2013-08-1929-0/+1346
|
* testing: enforce xauth-eap in ikev1/xauth-rsa-eap-md5-radiusMartin Willi2013-07-291-1/+1
| | | | | As eap-radius now provides its own XAuth backend and eap-radius is loaded before xauth-eap, we have to enforce the exact XAuth backend to use.
* testing: add a testcase for plain XAuth RADIUS authenticationMartin Willi2013-07-2916-0/+209
|
* fixed typo5.1.0rc1Andreas Steffen2013-07-191-1/+1
|
* updated some TNC scenariosAndreas Steffen2013-07-194-18/+59
|
* testing: Don't load certificates explicitly and delete CA certificates in ↵Tobias Brunner2013-07-156-4/+6
| | | | | | PKCS#12 scenarios Certificates are now properly extracted from PKCS#12 files.
* Override policy recommendation in enforcementAndreas Steffen2013-07-113-17/+17
|
* openssl plugin can replace random, hmac, and gcm pluginsAndreas Steffen2013-07-102-2/+2
|
* Added openssl-ikev2/net2net-pkcs12 scenarioAndreas Steffen2013-07-1013-0/+116
|
* Added ikev2/net2net-pkcs12 scenarioAndreas Steffen2013-07-1013-0/+116
|
* conntrack -F makes ikev2/nat-rw scenario to work alwaysAndreas Steffen2013-07-101-0/+1
|
* Register packages under Debian 7.0 x86_64Andreas Steffen2013-07-043-9/+9
|
* Ping from dave before shutting down tcpdump in libipsec/rw-suite-b test case5.1.0dr1Tobias Brunner2013-07-011-1/+1
|
* Fixed libipsec/rw-suite-b scenarioAndreas Steffen2013-07-015-107/+1
|
* Added libipsec/rw-suite-b scenarioAndreas Steffen2013-07-0132-0/+2693
|
* Added libipsec/net2net-cert scenarioAndreas Steffen2013-06-2911-0/+1512
|
* Add type=transport to tkm/host2host-* connectionsReto Buerki2013-06-292-0/+2
| | | | | Explicitly specify transport mode in connection configuration of the responding host (sun).
* 5.1.0 changes for test casesAndreas Steffen2013-06-29174-340/+4913
|
* dhcp: Use chunk_hash_static() to calculate ID-based MAC addressesTobias Brunner2013-06-282-4/+4
|
* Load any type (RSA/ECDSA) of public key via left|rightsigkeyTobias Brunner2013-05-079-13/+13
|
* left|rightrsasigkey accepts SSH keys but the key format has to be specified ↵Tobias Brunner2013-05-074-6/+6
| | | | | | | explicitly The default is now PKCS#1. With the dns: and ssh: prefixes other formats can be selected.
* Use attest database in tnc/tnccs-20-os scenario5.0.4Andreas Steffen2013-04-214-2/+15
|
* check for successful activation of FIPS modeAndreas Steffen2013-04-191-1/+4
|
* Added openssl-ikev2/rw-cpa scenarioAndreas Steffen2013-04-1929-0/+472
|
* disable reauth, tooAndreas Steffen2013-04-151-1/+2
|
* Added charon.initiator_only option which causes charon to ignore IKE ↵Andreas Steffen2013-04-1422-0/+264
| | | | initiation requests by peers
* cleaned up XML code in tnccs-11 pluginAndreas Steffen2013-04-044-10/+10
|
* Added Framed-IP-Address information to RADIUS accounting recordsAndreas Steffen2013-03-222-0/+2
|
* Added ikev2/rw-eap-framed-ip-radius scenarioAndreas Steffen2013-03-2219-0/+266
|
* Added ikev2/ip-two-pools-v4v6-db scenarioAndreas Steffen2013-03-229-0/+110
|
* Implement multiple-clients integration testReto Buerki2013-03-1912-0/+158
| | | | | | | | Two transport connections to gateway sun are set up, one from client carol and the other from client dave. The gateway sun uses the Trusted Key Manager (TKM) and is the responder for both connections. The authentication is based on X.509 certificates. In order to test the connections, both carol and dave ping gateway sun.
* Implement net2net-xfrmproxy integration testReto Buerki2013-03-1910-0/+108
|
* Implement net2net-initiator integration testReto Buerki2013-03-199-0/+104
|
* Add xfrm_proxy integration testReto Buerki2013-03-1910-0/+102
|
* Add TKM responder integration testReto Buerki2013-03-1910-0/+97
|
* Add initial TKM integration testReto Buerki2013-03-1910-0/+96
| | | | | | A connection between the hosts moon and sun is set up. The host moon uses the Trusted Key Manager (TKM) and is the initiator of the transport connection. The authentication is based on X.509 certificates.
* added openssl-ikev2/alg-aes-gcm scenarioAndreas Steffen2013-03-0311-0/+158
|
* use DNs in tnc/tnccs-20-tls scenarioAndreas Steffen2013-03-034-5/+3
|
* Added ikev2/rw-dnssec scenarioAndreas Steffen2013-02-1921-0/+301
|
* Added ikev2/net2net-dnssec scenarioAndreas Steffen2013-02-1917-0/+220
|
* added ikev1/net2net-fragmentation scenario5.0.3dr1Andreas Steffen2013-02-129-0/+122
|
* use EAP identity in tnc/tnccs-20-pdp scenarioAndreas Steffen2013-02-128-10/+12
|
* Removed UML from description of ikev2/default-keys testTobias Brunner2013-01-171-3/+3
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-17264-816/+816
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-17264-528/+528
|
* Drop vim swap fileReto Buerki2013-01-171-0/+0
|
* Drop obsolete Gentoo dhcpd init scriptReto Buerki2013-01-173-72/+0
|
* No need to enable ip_forward in pretest filesReto Buerki2013-01-1734-42/+0
| | | | It is enabled by default now.
* converted ha/both-active iptables scenarioAndreas Steffen2013-01-176-216/+108
|
* converted all ipv6 iptables/ip6tables scenariosAndreas Steffen2013-01-1794-4619/+380
|