Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | testing: Add some notes about how to reissue attribute certificates | Martin Willi | 2014-10-03 | 3 | -0/+61 | |
| | ||||||
* | testing: Reissue attribute certificates for the new holder certificates | Martin Willi | 2014-10-03 | 8 | -72/+72 | |
| | | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests. | |||||
* | configure: Load fetcher plugins after crypto base plugins | Martin Willi | 2014-09-24 | 669 | -681/+676 | |
| | | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl. | |||||
* | testing: Update certs and keys in tkm tests | Reto Buerki | 2014-09-17 | 6 | -0/+0 | |
| | | | | References #705. | |||||
* | Generated new test certificates | Andreas Steffen | 2014-08-28 | 2 | -42/+42 | |
| | ||||||
* | testing: Add sql/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 18 | -0/+740 | |
| | ||||||
* | testing: Add pfkey/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 13 | -0/+175 | |
| | ||||||
* | testing: Remove obsolete shunt-policies scenarios | Tobias Brunner | 2014-06-26 | 24 | -688/+0 | |
| | ||||||
* | Updated description of TNC scenarios concerning RFC 7171 PT-EAP support | Andreas Steffen | 2014-06-26 | 6 | -24/+30 | |
| | ||||||
* | Removed django.db from swid scenarios | Andreas Steffen | 2014-06-26 | 2 | -0/+0 | |
| | ||||||
* | testing: Add ikev2/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-19 | 12 | -0/+171 | |
| | ||||||
* | testing: Remove ikev2/shunt-policies scenario | Tobias Brunner | 2014-06-19 | 10 | -166/+0 | |
| | | | | | This scenario doesn't really apply anymore (especially its use of drop policies). | |||||
* | Added swanctl/net2net-route scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+145 | |
| | ||||||
* | Added swanctl/net2net-start scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+140 | |
| | ||||||
* | Minor changes in swanctl scenarios | Andreas Steffen | 2014-06-18 | 7 | -5/+8 | |
| | ||||||
* | Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenarios | Andreas Steffen | 2014-06-14 | 22 | -0/+441 | |
| | ||||||
* | Single-line --raw mode simplifies evaltest of swanctl scenarios | Andreas Steffen | 2014-06-14 | 5 | -92/+16 | |
| | ||||||
* | Added swanctl/ip-pool-db scenario | Andreas Steffen | 2014-06-11 | 11 | -0/+246 | |
| | ||||||
* | Updated strongTNC configuration | Andreas Steffen | 2014-06-11 | 6 | -8/+14 | |
| | ||||||
* | Added swanctl/ip-pool scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+231 | |
| | ||||||
* | Added swanctl/rw-cert scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+216 | |
| | ||||||
* | Define default swanctl credentials in hosts directory | Andreas Steffen | 2014-06-10 | 15 | -152/+14 | |
| | ||||||
* | First swanctl scenario5.2.0dr5 | Andreas Steffen | 2014-06-01 | 15 | -0/+288 | |
| | ||||||
* | Test SWID REST API ins tnc/tnccs-20-pdp scenarios | Andreas Steffen | 2014-05-31 | 21 | -69/+161 | |
| | ||||||
* | Migration from Debian 7.4 to 7.5 | Andreas Steffen | 2014-05-31 | 11 | -18/+18 | |
| | ||||||
* | Minor changes in the test environment5.2.0dr4 | Andreas Steffen | 2014-05-15 | 2 | -0/+10 | |
| | ||||||
* | Implemented PT-EAP protocol (RFC 7171) | Andreas Steffen | 2014-05-12 | 46 | -156/+163 | |
| | ||||||
* | testing: Added pfkey/compress test case | Tobias Brunner | 2014-04-24 | 9 | -0/+100 | |
| | ||||||
* | Handle tag separators | Andreas Steffen | 2014-04-15 | 1 | -1/+1 | |
| | ||||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 2 | -42/+42 | |
| | ||||||
* | Updated SWID scenarios | Andreas Steffen | 2014-04-15 | 6 | -4/+18 | |
| | ||||||
* | Implemented segmented SWID tag attributes on IMV side | Andreas Steffen | 2014-04-15 | 54 | -36/+101 | |
| | ||||||
* | Use python-based swidGenerator to generated SWID tags | Andreas Steffen | 2014-04-15 | 13 | -17/+25 | |
| | ||||||
* | Make Attestation IMV independent of OS IMV | Andreas Steffen | 2014-04-15 | 21 | -11/+310 | |
| | ||||||
* | Fixed pretest script in tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2014-04-04 | 1 | -1/+1 | |
| | ||||||
* | testing: Run 'conntrack -F' before all test scenarios | Tobias Brunner | 2014-04-02 | 27 | -41/+5 | |
| | | | | This prevents failures due to remaining conntrack entries. | |||||
* | Test TLS AEAD cipher suites | Andreas Steffen | 2014-04-01 | 10 | -10/+17 | |
| | ||||||
* | Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenario | Andreas Steffen | 2014-03-31 | 1 | -1/+1 | |
| | ||||||
* | revocation: Restrict OCSP signing to specific certificates | Martin Willi | 2014-03-31 | 2 | -3/+2 | |
| | | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally. | |||||
* | testing: Add an acert test that forces a fallback connection based on groups | Martin Willi | 2014-03-31 | 13 | -0/+199 | |
| | ||||||
* | testing: Add an acert test case sending attribute certificates inline | Martin Willi | 2014-03-31 | 18 | -0/+291 | |
| | ||||||
* | testing: Add an acert test using locally cached attribute certificates | Martin Willi | 2014-03-31 | 16 | -0/+239 | |
| | ||||||
* | Added libipsec/net2net-3des scenario | Andreas Steffen | 2014-03-28 | 11 | -0/+1521 | |
| | ||||||
* | Renewed self-signed OCSP signer certificate | Andreas Steffen | 2014-03-27 | 2 | -28/+28 | |
| | ||||||
* | Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵ | Andreas Steffen | 2014-03-24 | 1 | -0/+4 | |
| | | | | scenario | |||||
* | Updated expired certificates issued by the Research and Sales Intermediate CAs | Andreas Steffen | 2014-03-24 | 4 | -87/+87 | |
| | ||||||
* | Renewed revoked Research CA certificate5.1.3dr1 | Andreas Steffen | 2014-03-22 | 1 | -9/+9 | |
| | ||||||
* | Added openssl-ikev2/net2net-pgp-v3 scenario | Andreas Steffen | 2014-03-22 | 17 | -0/+208 | |
| | ||||||
* | Completed integration of ntru_crypto library into ntru plugin | Andreas Steffen | 2014-03-22 | 9 | -0/+128 | |
| | ||||||
* | Merged libstrongswan options into charon section | Andreas Steffen | 2014-03-15 | 98 | -240/+41 | |
| |