Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | testing: Add an IKEv1 host2host AH transport mode test case | Martin Willi | 2013-10-11 | 9 | -0/+89 | |
| | ||||||
* | testing: Add an IKEv1 net2net AH test case | Martin Willi | 2013-10-11 | 9 | -0/+102 | |
| | ||||||
* | testing: Add an IKEv2 host2host AH transport mode test case | Martin Willi | 2013-10-11 | 9 | -0/+89 | |
| | ||||||
* | testing: Add an IKEv2 net2net AH test case | Martin Willi | 2013-10-11 | 9 | -0/+101 | |
| | ||||||
* | Implemented TCG/PB-PDP_Referral message | Andreas Steffen | 2013-09-17 | 1 | -0/+2 | |
| | ||||||
* | Added ikev1/config-payload-push scenario | Andreas Steffen | 2013-09-07 | 11 | -0/+161 | |
| | ||||||
* | Added tags table and some tag samples | Andreas Steffen | 2013-09-05 | 1 | -1/+81 | |
| | ||||||
* | Added regids table and some sample reqid data | Andreas Steffen | 2013-09-02 | 1 | -0/+49 | |
| | ||||||
* | Pull dave for OS info | Andreas Steffen | 2013-09-02 | 1 | -1/+1 | |
| | ||||||
* | Cleaned configuration files in PT-TLS client scenario | Andreas Steffen | 2013-08-22 | 11 | -127/+13 | |
| | ||||||
* | Flush iptables rules on alice | Andreas Steffen | 2013-08-19 | 1 | -1/+1 | |
| | ||||||
* | Fixes in tnc scenarios | Andreas Steffen | 2013-08-19 | 3 | -2/+5 | |
| | ||||||
* | Added tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2013-08-19 | 29 | -0/+1346 | |
| | ||||||
* | testing: enforce xauth-eap in ikev1/xauth-rsa-eap-md5-radius | Martin Willi | 2013-07-29 | 1 | -1/+1 | |
| | | | | | As eap-radius now provides its own XAuth backend and eap-radius is loaded before xauth-eap, we have to enforce the exact XAuth backend to use. | |||||
* | testing: add a testcase for plain XAuth RADIUS authentication | Martin Willi | 2013-07-29 | 16 | -0/+209 | |
| | ||||||
* | fixed typo5.1.0rc1 | Andreas Steffen | 2013-07-19 | 1 | -1/+1 | |
| | ||||||
* | updated some TNC scenarios | Andreas Steffen | 2013-07-19 | 4 | -18/+59 | |
| | ||||||
* | testing: Don't load certificates explicitly and delete CA certificates in ↵ | Tobias Brunner | 2013-07-15 | 6 | -4/+6 | |
| | | | | | | PKCS#12 scenarios Certificates are now properly extracted from PKCS#12 files. | |||||
* | Override policy recommendation in enforcement | Andreas Steffen | 2013-07-11 | 3 | -17/+17 | |
| | ||||||
* | openssl plugin can replace random, hmac, and gcm plugins | Andreas Steffen | 2013-07-10 | 2 | -2/+2 | |
| | ||||||
* | Added openssl-ikev2/net2net-pkcs12 scenario | Andreas Steffen | 2013-07-10 | 13 | -0/+116 | |
| | ||||||
* | Added ikev2/net2net-pkcs12 scenario | Andreas Steffen | 2013-07-10 | 13 | -0/+116 | |
| | ||||||
* | conntrack -F makes ikev2/nat-rw scenario to work always | Andreas Steffen | 2013-07-10 | 1 | -0/+1 | |
| | ||||||
* | Register packages under Debian 7.0 x86_64 | Andreas Steffen | 2013-07-04 | 3 | -9/+9 | |
| | ||||||
* | Ping from dave before shutting down tcpdump in libipsec/rw-suite-b test case5.1.0dr1 | Tobias Brunner | 2013-07-01 | 1 | -1/+1 | |
| | ||||||
* | Fixed libipsec/rw-suite-b scenario | Andreas Steffen | 2013-07-01 | 5 | -107/+1 | |
| | ||||||
* | Added libipsec/rw-suite-b scenario | Andreas Steffen | 2013-07-01 | 32 | -0/+2693 | |
| | ||||||
* | Added libipsec/net2net-cert scenario | Andreas Steffen | 2013-06-29 | 11 | -0/+1512 | |
| | ||||||
* | Add type=transport to tkm/host2host-* connections | Reto Buerki | 2013-06-29 | 2 | -0/+2 | |
| | | | | | Explicitly specify transport mode in connection configuration of the responding host (sun). | |||||
* | 5.1.0 changes for test cases | Andreas Steffen | 2013-06-29 | 174 | -340/+4913 | |
| | ||||||
* | dhcp: Use chunk_hash_static() to calculate ID-based MAC addresses | Tobias Brunner | 2013-06-28 | 2 | -4/+4 | |
| | ||||||
* | Load any type (RSA/ECDSA) of public key via left|rightsigkey | Tobias Brunner | 2013-05-07 | 9 | -13/+13 | |
| | ||||||
* | left|rightrsasigkey accepts SSH keys but the key format has to be specified ↵ | Tobias Brunner | 2013-05-07 | 4 | -6/+6 | |
| | | | | | | | explicitly The default is now PKCS#1. With the dns: and ssh: prefixes other formats can be selected. | |||||
* | Use attest database in tnc/tnccs-20-os scenario5.0.4 | Andreas Steffen | 2013-04-21 | 4 | -2/+15 | |
| | ||||||
* | check for successful activation of FIPS mode | Andreas Steffen | 2013-04-19 | 1 | -1/+4 | |
| | ||||||
* | Added openssl-ikev2/rw-cpa scenario | Andreas Steffen | 2013-04-19 | 29 | -0/+472 | |
| | ||||||
* | disable reauth, too | Andreas Steffen | 2013-04-15 | 1 | -1/+2 | |
| | ||||||
* | Added charon.initiator_only option which causes charon to ignore IKE ↵ | Andreas Steffen | 2013-04-14 | 22 | -0/+264 | |
| | | | | initiation requests by peers | |||||
* | cleaned up XML code in tnccs-11 plugin | Andreas Steffen | 2013-04-04 | 4 | -10/+10 | |
| | ||||||
* | Added Framed-IP-Address information to RADIUS accounting records | Andreas Steffen | 2013-03-22 | 2 | -0/+2 | |
| | ||||||
* | Added ikev2/rw-eap-framed-ip-radius scenario | Andreas Steffen | 2013-03-22 | 19 | -0/+266 | |
| | ||||||
* | Added ikev2/ip-two-pools-v4v6-db scenario | Andreas Steffen | 2013-03-22 | 9 | -0/+110 | |
| | ||||||
* | Implement multiple-clients integration test | Reto Buerki | 2013-03-19 | 12 | -0/+158 | |
| | | | | | | | | Two transport connections to gateway sun are set up, one from client carol and the other from client dave. The gateway sun uses the Trusted Key Manager (TKM) and is the responder for both connections. The authentication is based on X.509 certificates. In order to test the connections, both carol and dave ping gateway sun. | |||||
* | Implement net2net-xfrmproxy integration test | Reto Buerki | 2013-03-19 | 10 | -0/+108 | |
| | ||||||
* | Implement net2net-initiator integration test | Reto Buerki | 2013-03-19 | 9 | -0/+104 | |
| | ||||||
* | Add xfrm_proxy integration test | Reto Buerki | 2013-03-19 | 10 | -0/+102 | |
| | ||||||
* | Add TKM responder integration test | Reto Buerki | 2013-03-19 | 10 | -0/+97 | |
| | ||||||
* | Add initial TKM integration test | Reto Buerki | 2013-03-19 | 10 | -0/+96 | |
| | | | | | | A connection between the hosts moon and sun is set up. The host moon uses the Trusted Key Manager (TKM) and is the initiator of the transport connection. The authentication is based on X.509 certificates. | |||||
* | added openssl-ikev2/alg-aes-gcm scenario | Andreas Steffen | 2013-03-03 | 11 | -0/+158 | |
| | ||||||
* | use DNs in tnc/tnccs-20-tls scenario | Andreas Steffen | 2013-03-03 | 4 | -5/+3 | |
| |