aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
...
* Generated new test certificatesAndreas Steffen2014-08-282-42/+42
|
* testing: Add sql/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2618-0/+740
|
* testing: Add pfkey/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2613-0/+175
|
* testing: Remove obsolete shunt-policies scenariosTobias Brunner2014-06-2624-688/+0
|
* Updated description of TNC scenarios concerning RFC 7171 PT-EAP supportAndreas Steffen2014-06-266-24/+30
|
* Removed django.db from swid scenariosAndreas Steffen2014-06-262-0/+0
|
* testing: Add ikev2/shunt-policies-nat-rw scenarioTobias Brunner2014-06-1912-0/+171
|
* testing: Remove ikev2/shunt-policies scenarioTobias Brunner2014-06-1910-166/+0
| | | | | This scenario doesn't really apply anymore (especially its use of drop policies).
* Added swanctl/net2net-route scenarioAndreas Steffen2014-06-189-0/+145
|
* Added swanctl/net2net-start scenarioAndreas Steffen2014-06-189-0/+140
|
* Minor changes in swanctl scenariosAndreas Steffen2014-06-187-5/+8
|
* Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenariosAndreas Steffen2014-06-1422-0/+441
|
* Single-line --raw mode simplifies evaltest of swanctl scenariosAndreas Steffen2014-06-145-92/+16
|
* Added swanctl/ip-pool-db scenarioAndreas Steffen2014-06-1111-0/+246
|
* Updated strongTNC configurationAndreas Steffen2014-06-116-8/+14
|
* Added swanctl/ip-pool scenarioAndreas Steffen2014-06-1011-0/+231
|
* Added swanctl/rw-cert scenarioAndreas Steffen2014-06-1011-0/+216
|
* Define default swanctl credentials in hosts directoryAndreas Steffen2014-06-1015-152/+14
|
* First swanctl scenario5.2.0dr5Andreas Steffen2014-06-0115-0/+288
|
* Test SWID REST API ins tnc/tnccs-20-pdp scenariosAndreas Steffen2014-05-3121-69/+161
|
* Migration from Debian 7.4 to 7.5Andreas Steffen2014-05-3111-18/+18
|
* Minor changes in the test environment5.2.0dr4Andreas Steffen2014-05-152-0/+10
|
* Implemented PT-EAP protocol (RFC 7171)Andreas Steffen2014-05-1246-156/+163
|
* testing: Added pfkey/compress test caseTobias Brunner2014-04-249-0/+100
|
* Handle tag separatorsAndreas Steffen2014-04-151-1/+1
|
* Renewed expired user certificateAndreas Steffen2014-04-152-42/+42
|
* Updated SWID scenariosAndreas Steffen2014-04-156-4/+18
|
* Implemented segmented SWID tag attributes on IMV sideAndreas Steffen2014-04-1554-36/+101
|
* Use python-based swidGenerator to generated SWID tagsAndreas Steffen2014-04-1513-17/+25
|
* Make Attestation IMV independent of OS IMVAndreas Steffen2014-04-1521-11/+310
|
* Fixed pretest script in tnc/tnccs-20-pt-tls scenarioAndreas Steffen2014-04-041-1/+1
|
* testing: Run 'conntrack -F' before all test scenariosTobias Brunner2014-04-0227-41/+5
| | | | This prevents failures due to remaining conntrack entries.
* Test TLS AEAD cipher suitesAndreas Steffen2014-04-0110-10/+17
|
* Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenarioAndreas Steffen2014-03-311-1/+1
|
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-312-3/+2
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* testing: Add an acert test that forces a fallback connection based on groupsMartin Willi2014-03-3113-0/+199
|
* testing: Add an acert test case sending attribute certificates inlineMartin Willi2014-03-3118-0/+291
|
* testing: Add an acert test using locally cached attribute certificatesMartin Willi2014-03-3116-0/+239
|
* Added libipsec/net2net-3des scenarioAndreas Steffen2014-03-2811-0/+1521
|
* Renewed self-signed OCSP signer certificateAndreas Steffen2014-03-272-28/+28
|
* Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵Andreas Steffen2014-03-241-0/+4
| | | | scenario
* Updated expired certificates issued by the Research and Sales Intermediate CAsAndreas Steffen2014-03-244-87/+87
|
* Renewed revoked Research CA certificate5.1.3dr1Andreas Steffen2014-03-221-9/+9
|
* Added openssl-ikev2/net2net-pgp-v3 scenarioAndreas Steffen2014-03-2217-0/+208
|
* Completed integration of ntru_crypto library into ntru pluginAndreas Steffen2014-03-229-0/+128
|
* Merged libstrongswan options into charon sectionAndreas Steffen2014-03-1598-240/+41
|
* strongswan.conf is not needed on RADIUS server aliceAndreas Steffen2014-03-152-0/+2
|
* Disable mandatory ECP support for attestionAndreas Steffen2014-03-0718-0/+312
|
* Added ikev2/lookip scenarioAndreas Steffen2014-02-1711-0/+149
|
* testing: Use installed PTS SQL schema and data instead of local copyTobias Brunner2014-02-124-8/+8
|