aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
* mgf1: Refactored MGF1 as an XOFAndreas Steffen2016-09-2129-29/+30
|
* testing: Use curl instead of soup plugin in libipsec/rw-suite-b scenarioTobias Brunner2016-09-203-3/+3
| | | | | The soup plugin is already used in the openssl-ikev2/rw-suite-b* scenarios.
* testing: Virtual IPs went missingAndreas Steffen2016-08-165-15/+17
|
* testing: Added swanctl/rw-newhope-bliss scenarioAndreas Steffen2016-08-1020-0/+212
|
* testing: Add chapoly, ntru and newhope plugins to crypto and integrity testsAndreas Steffen2016-08-103-3/+3
|
* testing: Added ikev2/rw-newhope-bliss scenarioAndreas Steffen2016-08-1023-0/+193
|
* testing: Add ikev1/net2net-esn scenarioTobias Brunner2016-06-299-0/+117
|
* testing: Start charon before Apache in tnc/tnccs-20-pdp-pt-tlsTobias Brunner2016-06-211-1/+1
| | | | | | | | | | | | | The change in c423d0e8a124 ("testing: Fix race in tnc/tnccs-20-pdp-pt-tls scenario") is not really ideal as now the vici plugin might not yet be ready when `swanctl --load-creds` is called. Perhaps starting charon before Apache causes enough delay. Once we switch to charon-systemd this isn't a problem anymore as starting the unit will block until everything is up and ready. Also, the individual swanctl calls will be redundant as the default service unit calls --load-all. But start scripts do run before charon-systemd signals that the daemon is ready, so using these would work too then.
* testing: Fix race in tnc/tnccs-20-pdp-pt-tls scenarioTobias Brunner2016-06-172-3/+1
| | | | | | | | | | aacf84d837e7 ("testing: Add expect-connection calls for all tests and hosts") removed the expect-connection call for the non-existing aaa connection. However, because the credentials were loaded asynchronously via start-script the clients might have been connecting when the secrets were not yet loaded. As `swanctl --load-creds` is a synchronous call this change avoids that issue without having to add a sleep or failing expect-connection call.
* testing: Use TLS 1.2 in RADIUS test casesTobias Brunner2016-06-172-0/+6
| | | | | | | | | This took a while as in the OpenSSL package shipped with Debian and on which our FIPS-enabled package is based, the function SSL_export_keying_material(), which is used by FreeRADIUS to derive the MSK, did not use the correct digest to calculate the result when TLS 1.2 was used. This caused IKE to fail with "verification of AUTH payload with EAP MSK failed". The fix was only backported to jessie recently.
* testing: Fix firewall rule on alice in tnc/tnccs-20-pdp-pt-tls scenarioTobias Brunner2016-06-171-2/+2
|
* testing: Add expect-connection calls for all tests and hostsTobias Brunner2016-06-16184-11/+236
| | | | There are some exceptions (e.g. those that use auto=start or p2pnat).
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-16289-576/+576
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Fix posttest.dat for ikev2/rw-dnssec scenarioTobias Brunner2016-06-161-6/+6
|
* testing: Update Apache config for newer Debian releasesTobias Brunner2016-06-154-52/+64
| | | | | | It is still compatible with the current release as the config in sites-available will be ignored, while conf-enabled does not exist and is not included in the main config.
* testing: Fix scenarios that check /etc/resolv.confTobias Brunner2016-06-133-6/+6
|
* testing: Changed gcrypt-ikev1 scenarios to swanctlAndreas Steffen2016-05-1520-126/+148
|
* testing: wait until connections are loadedAndreas Steffen2016-05-1598-89/+178
|
* swanctl: Do not display rekey times for shuntsAndreas Steffen2016-05-051-0/+1
|
* testing: Use reauthentication and set CHILD_SA rekey time, bytes and packets ↵Andreas Steffen2016-05-042-0/+8
| | | | limits
* testing: uses xauth_id in swanctl/xauth-rsa scenarioAndreas Steffen2016-05-044-6/+8
|
* testing: Use absolute path of imv_policy_managerAndreas Steffen2016-04-268-8/+9
|
* testing: Added swanctl/rw-multi-ciphers-ikev1 scenarioAndreas Steffen2016-04-1211-0/+238
|
* testing: Added swanctl/manual_prio scenarioAndreas Steffen2016-04-0911-0/+277
|
* testing: Add swanctl/net2net-gw scenarioTobias Brunner2016-04-0911-0/+204
|
* testing: List conntrack table on sun in ikev2/host2host-transport-connmark ↵Tobias Brunner2016-04-061-0/+1
| | | | scenario
* testing: Updated updown scripts in libipsec scenarios to latest versionTobias Brunner2016-03-2311-0/+341
|
* Updated swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-105-28/+36
|
* testing: Add ikev2/reauth-mbb-revoked scenarioTobias Brunner2016-03-109-0/+105
|
* testing: Added swanctl/mult-auth-rsa-eap-sim-id scenarioAndreas Steffen2016-03-0620-0/+335
|
* testing: Added swanctl/xauth-rsa scenarioAndreas Steffen2016-03-0611-0/+211
|
* testing: attr-sql is a charon plugin5.4.0dr8Andreas Steffen2016-03-0511-42/+10
|
* testing: Added swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-0511-0/+271
|
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-0568-238/+221
|
* testing: Add ikev2/redirect-active scenarioTobias Brunner2016-03-0420-0/+322
|
* testing: Added swanctl/protoport-range scenarioAndreas Steffen2016-03-049-0/+159
|
* libhydra: Remove empty unused libraryTobias Brunner2016-03-0311-11/+11
|
* testing: Added swanctl/shunt-policies-nat-rwAndreas Steffen2016-02-2812-0/+231
|
* testing: Some minor fixes in test scenariosAndreas Steffen2016-02-282-0/+3
|
* testing: Added swanctl/protoport-dual scenarioAndreas Steffen2016-02-289-0/+142
|
* testing: converted af-alg scenarios to swanctlAndreas Steffen2016-02-2625-149/+198
|
* testing: Use absolute path to the _updown script in SQL scenariosTobias Brunner2016-02-1747-55/+55
| | | | | | /usr/local/sbin is not included in PATH set by the charon init script and since the ipsec script is obsolete when using swanctl it makes sense to change this anyway.
* testing: Increased ping interval in ikev2/trap-any scenarioAndreas Steffen2016-02-161-5/+5
|
* Corrected the description of the swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-161-1/+1
|
* Fix of the mutual TNC measurement use caseAndreas Steffen2016-02-1615-8/+214
| | | | | | | | | | | | | | | | | If the IKEv2 initiator acting as a TNC server receives invalid TNC measurements from the IKEv2 responder acting as a TNC clienti, the exchange of PB-TNC batches is continued until the IKEv2 responder acting as a TNC server has also finished its TNC measurements. In the past if these measurements in the other direction were correct the IKEv2 responder acting as EAP server declared the IKEv2 EAP authentication successful and the IPsec connection was established even though the TNC measurement verification on the EAP peer side failed. The fix adds an "allow" group membership on each endpoint if the corresponding TNC measurements of the peer are successful. By requiring a "allow" group membership in the IKEv2 connection definition the IPsec connection succeeds only if the TNC measurements on both sides are valid.
* testing: Added swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-0315-0/+279
|
* ikev1: Log successful authentication with signature schemeThomas Egerer2016-02-013-6/+6
| | | | | | Output is now identical to that of the IKEv2 pubkey authenticator. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
* testing: Don't attempt to start the daemon twice in ha/active-passive scenarioTobias Brunner2016-02-011-1/+0
|
* testing: Added swanctl/config-payload scenarioAndreas Steffen2016-01-1412-0/+219
|
* testing: Use include statement in swanctl/rw-pubkey-keyid scenarioAndreas Steffen2016-01-143-30/+19
|