aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
...
* testing: Updated certificates and keys in sql scenariosAndreas Steffen2014-10-0635-121/+121
|
* Updated revoked certificate in ikev2/ocsp-revoked scenarioAndreas Steffen2014-10-052-42/+42
|
* The critical-extension scenarios need the old private keysAndreas Steffen2014-10-054-0/+108
|
* testing: Wait a bit in swanctl scenarios before interacting with the daemonTobias Brunner2014-10-037-9/+16
|
* testing: Make sure the whitelist plugin is ready before configuring itTobias Brunner2014-10-031-1/+3
|
* testing: Update PKCS#12 containersTobias Brunner2014-10-034-0/+0
|
* testing: Update PKCS#8 keysTobias Brunner2014-10-033-81/+81
|
* testing: Update public keys in DNSSEC scenariosTobias Brunner2014-10-033-0/+0
| | | | | The tests are successful even if the public keys are not stored locally, but an additional DNS query is required to fetch them.
* testing: Update carols certificate in several test casesTobias Brunner2014-10-036-129/+129
|
* testing: Add some notes about how to reissue attribute certificatesMartin Willi2014-10-033-0/+61
|
* testing: Reissue attribute certificates for the new holder certificatesMartin Willi2014-10-038-72/+72
| | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests.
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-24669-681/+676
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Update certs and keys in tkm testsReto Buerki2014-09-176-0/+0
| | | | References #705.
* Generated new test certificatesAndreas Steffen2014-08-282-42/+42
|
* testing: Add sql/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2618-0/+740
|
* testing: Add pfkey/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2613-0/+175
|
* testing: Remove obsolete shunt-policies scenariosTobias Brunner2014-06-2624-688/+0
|
* Updated description of TNC scenarios concerning RFC 7171 PT-EAP supportAndreas Steffen2014-06-266-24/+30
|
* Removed django.db from swid scenariosAndreas Steffen2014-06-262-0/+0
|
* testing: Add ikev2/shunt-policies-nat-rw scenarioTobias Brunner2014-06-1912-0/+171
|
* testing: Remove ikev2/shunt-policies scenarioTobias Brunner2014-06-1910-166/+0
| | | | | This scenario doesn't really apply anymore (especially its use of drop policies).
* Added swanctl/net2net-route scenarioAndreas Steffen2014-06-189-0/+145
|
* Added swanctl/net2net-start scenarioAndreas Steffen2014-06-189-0/+140
|
* Minor changes in swanctl scenariosAndreas Steffen2014-06-187-5/+8
|
* Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenariosAndreas Steffen2014-06-1422-0/+441
|
* Single-line --raw mode simplifies evaltest of swanctl scenariosAndreas Steffen2014-06-145-92/+16
|
* Added swanctl/ip-pool-db scenarioAndreas Steffen2014-06-1111-0/+246
|
* Updated strongTNC configurationAndreas Steffen2014-06-116-8/+14
|
* Added swanctl/ip-pool scenarioAndreas Steffen2014-06-1011-0/+231
|
* Added swanctl/rw-cert scenarioAndreas Steffen2014-06-1011-0/+216
|
* Define default swanctl credentials in hosts directoryAndreas Steffen2014-06-1015-152/+14
|
* First swanctl scenario5.2.0dr5Andreas Steffen2014-06-0115-0/+288
|
* Test SWID REST API ins tnc/tnccs-20-pdp scenariosAndreas Steffen2014-05-3121-69/+161
|
* Migration from Debian 7.4 to 7.5Andreas Steffen2014-05-3111-18/+18
|
* Minor changes in the test environment5.2.0dr4Andreas Steffen2014-05-152-0/+10
|
* Implemented PT-EAP protocol (RFC 7171)Andreas Steffen2014-05-1246-156/+163
|
* testing: Added pfkey/compress test caseTobias Brunner2014-04-249-0/+100
|
* Handle tag separatorsAndreas Steffen2014-04-151-1/+1
|
* Renewed expired user certificateAndreas Steffen2014-04-152-42/+42
|
* Updated SWID scenariosAndreas Steffen2014-04-156-4/+18
|
* Implemented segmented SWID tag attributes on IMV sideAndreas Steffen2014-04-1554-36/+101
|
* Use python-based swidGenerator to generated SWID tagsAndreas Steffen2014-04-1513-17/+25
|
* Make Attestation IMV independent of OS IMVAndreas Steffen2014-04-1521-11/+310
|
* Fixed pretest script in tnc/tnccs-20-pt-tls scenarioAndreas Steffen2014-04-041-1/+1
|
* testing: Run 'conntrack -F' before all test scenariosTobias Brunner2014-04-0227-41/+5
| | | | This prevents failures due to remaining conntrack entries.
* Test TLS AEAD cipher suitesAndreas Steffen2014-04-0110-10/+17
|
* Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenarioAndreas Steffen2014-03-311-1/+1
|
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-312-3/+2
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* testing: Add an acert test that forces a fallback connection based on groupsMartin Willi2014-03-3113-0/+199
|
* testing: Add an acert test case sending attribute certificates inlineMartin Willi2014-03-3118-0/+291
|