aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
...
* Added libipsec/rw-suite-b scenarioAndreas Steffen2013-07-0132-0/+2693
|
* Added libipsec/net2net-cert scenarioAndreas Steffen2013-06-2911-0/+1512
|
* Add type=transport to tkm/host2host-* connectionsReto Buerki2013-06-292-0/+2
| | | | | Explicitly specify transport mode in connection configuration of the responding host (sun).
* 5.1.0 changes for test casesAndreas Steffen2013-06-29174-340/+4913
|
* dhcp: Use chunk_hash_static() to calculate ID-based MAC addressesTobias Brunner2013-06-282-4/+4
|
* Load any type (RSA/ECDSA) of public key via left|rightsigkeyTobias Brunner2013-05-079-13/+13
|
* left|rightrsasigkey accepts SSH keys but the key format has to be specified ↵Tobias Brunner2013-05-074-6/+6
| | | | | | | explicitly The default is now PKCS#1. With the dns: and ssh: prefixes other formats can be selected.
* Use attest database in tnc/tnccs-20-os scenario5.0.4Andreas Steffen2013-04-214-2/+15
|
* check for successful activation of FIPS modeAndreas Steffen2013-04-191-1/+4
|
* Added openssl-ikev2/rw-cpa scenarioAndreas Steffen2013-04-1929-0/+472
|
* disable reauth, tooAndreas Steffen2013-04-151-1/+2
|
* Added charon.initiator_only option which causes charon to ignore IKE ↵Andreas Steffen2013-04-1422-0/+264
| | | | initiation requests by peers
* cleaned up XML code in tnccs-11 pluginAndreas Steffen2013-04-044-10/+10
|
* Added Framed-IP-Address information to RADIUS accounting recordsAndreas Steffen2013-03-222-0/+2
|
* Added ikev2/rw-eap-framed-ip-radius scenarioAndreas Steffen2013-03-2219-0/+266
|
* Added ikev2/ip-two-pools-v4v6-db scenarioAndreas Steffen2013-03-229-0/+110
|
* Implement multiple-clients integration testReto Buerki2013-03-1912-0/+158
| | | | | | | | Two transport connections to gateway sun are set up, one from client carol and the other from client dave. The gateway sun uses the Trusted Key Manager (TKM) and is the responder for both connections. The authentication is based on X.509 certificates. In order to test the connections, both carol and dave ping gateway sun.
* Implement net2net-xfrmproxy integration testReto Buerki2013-03-1910-0/+108
|
* Implement net2net-initiator integration testReto Buerki2013-03-199-0/+104
|
* Add xfrm_proxy integration testReto Buerki2013-03-1910-0/+102
|
* Add TKM responder integration testReto Buerki2013-03-1910-0/+97
|
* Add initial TKM integration testReto Buerki2013-03-1910-0/+96
| | | | | | A connection between the hosts moon and sun is set up. The host moon uses the Trusted Key Manager (TKM) and is the initiator of the transport connection. The authentication is based on X.509 certificates.
* added openssl-ikev2/alg-aes-gcm scenarioAndreas Steffen2013-03-0311-0/+158
|
* use DNs in tnc/tnccs-20-tls scenarioAndreas Steffen2013-03-034-5/+3
|
* Added ikev2/rw-dnssec scenarioAndreas Steffen2013-02-1921-0/+301
|
* Added ikev2/net2net-dnssec scenarioAndreas Steffen2013-02-1917-0/+220
|
* added ikev1/net2net-fragmentation scenario5.0.3dr1Andreas Steffen2013-02-129-0/+122
|
* use EAP identity in tnc/tnccs-20-pdp scenarioAndreas Steffen2013-02-128-10/+12
|
* Removed UML from description of ikev2/default-keys testTobias Brunner2013-01-171-3/+3
|
* Updated comments in test.conf of all testsTobias Brunner2013-01-17264-816/+816
|
* Renamed $UMLHOSTS to $VIRTHOSTSTobias Brunner2013-01-17264-528/+528
|
* Drop vim swap fileReto Buerki2013-01-171-0/+0
|
* Drop obsolete Gentoo dhcpd init scriptReto Buerki2013-01-173-72/+0
|
* No need to enable ip_forward in pretest filesReto Buerki2013-01-1734-42/+0
| | | | It is enabled by default now.
* converted ha/both-active iptables scenarioAndreas Steffen2013-01-176-216/+108
|
* converted all ipv6 iptables/ip6tables scenariosAndreas Steffen2013-01-1794-4619/+380
|
* converted all p2pnat iptables scenariosAndreas Steffen2013-01-1715-396/+164
|
* converted all tnc iptables scenariosAndreas Steffen2013-01-1732-330/+174
|
* implemented ip6tables.rulesAndreas Steffen2013-01-175-0/+54
|
* converted all sql iptables scenariosAndreas Steffen2013-01-1737-489/+116
|
* converted all pfkey iptables scenariosAndreas Steffen2013-01-1725-132/+104
|
* converted all openssl-ikev2 iptables scenariosAndreas Steffen2013-01-1718-48/+48
|
* converted all openssl-ikev1 iptables scenariosAndreas Steffen2013-01-178-22/+22
|
* converted all gcrypt-ikev2 iptables scenariosAndreas Steffen2013-01-174-10/+10
|
* converted all af-alg iptables scenariosAndreas Steffen2013-01-174-10/+10
|
* added ikev1/nat-virtual-ip scenarioAndreas Steffen2013-01-1711-0/+328
|
* converted all ikev1 iptables scenariosAndreas Steffen2013-01-1779-270/+290
|
* use iptables-restore in all ikev2 firewall scenariosAndreas Steffen2013-01-17245-2743/+1374
|
* Updated mark_update script in several IKEv2 scenariosAndreas Steffen2013-01-173-9/+39
|
* activated iptables in some ikev2 scenariosAndreas Steffen2013-01-1728-686/+222
|