aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
...
* testing: Add an IKEv1 host2host AH transport mode test caseMartin Willi2013-10-119-0/+89
|
* testing: Add an IKEv1 net2net AH test caseMartin Willi2013-10-119-0/+102
|
* testing: Add an IKEv2 host2host AH transport mode test caseMartin Willi2013-10-119-0/+89
|
* testing: Add an IKEv2 net2net AH test caseMartin Willi2013-10-119-0/+101
|
* Implemented TCG/PB-PDP_Referral messageAndreas Steffen2013-09-171-0/+2
|
* Added ikev1/config-payload-push scenarioAndreas Steffen2013-09-0711-0/+161
|
* Added tags table and some tag samplesAndreas Steffen2013-09-051-1/+81
|
* Added regids table and some sample reqid dataAndreas Steffen2013-09-021-0/+49
|
* Pull dave for OS infoAndreas Steffen2013-09-021-1/+1
|
* Cleaned configuration files in PT-TLS client scenarioAndreas Steffen2013-08-2211-127/+13
|
* Flush iptables rules on aliceAndreas Steffen2013-08-191-1/+1
|
* Fixes in tnc scenariosAndreas Steffen2013-08-193-2/+5
|
* Added tnc/tnccs-20-pt-tls scenarioAndreas Steffen2013-08-1929-0/+1346
|
* testing: enforce xauth-eap in ikev1/xauth-rsa-eap-md5-radiusMartin Willi2013-07-291-1/+1
| | | | | As eap-radius now provides its own XAuth backend and eap-radius is loaded before xauth-eap, we have to enforce the exact XAuth backend to use.
* testing: add a testcase for plain XAuth RADIUS authenticationMartin Willi2013-07-2916-0/+209
|
* fixed typo5.1.0rc1Andreas Steffen2013-07-191-1/+1
|
* updated some TNC scenariosAndreas Steffen2013-07-194-18/+59
|
* testing: Don't load certificates explicitly and delete CA certificates in ↵Tobias Brunner2013-07-156-4/+6
| | | | | | PKCS#12 scenarios Certificates are now properly extracted from PKCS#12 files.
* Override policy recommendation in enforcementAndreas Steffen2013-07-113-17/+17
|
* openssl plugin can replace random, hmac, and gcm pluginsAndreas Steffen2013-07-102-2/+2
|
* Added openssl-ikev2/net2net-pkcs12 scenarioAndreas Steffen2013-07-1013-0/+116
|
* Added ikev2/net2net-pkcs12 scenarioAndreas Steffen2013-07-1013-0/+116
|
* conntrack -F makes ikev2/nat-rw scenario to work alwaysAndreas Steffen2013-07-101-0/+1
|
* Register packages under Debian 7.0 x86_64Andreas Steffen2013-07-043-9/+9
|
* Ping from dave before shutting down tcpdump in libipsec/rw-suite-b test case5.1.0dr1Tobias Brunner2013-07-011-1/+1
|
* Fixed libipsec/rw-suite-b scenarioAndreas Steffen2013-07-015-107/+1
|
* Added libipsec/rw-suite-b scenarioAndreas Steffen2013-07-0132-0/+2693
|
* Added libipsec/net2net-cert scenarioAndreas Steffen2013-06-2911-0/+1512
|
* Add type=transport to tkm/host2host-* connectionsReto Buerki2013-06-292-0/+2
| | | | | Explicitly specify transport mode in connection configuration of the responding host (sun).
* 5.1.0 changes for test casesAndreas Steffen2013-06-29174-340/+4913
|
* dhcp: Use chunk_hash_static() to calculate ID-based MAC addressesTobias Brunner2013-06-282-4/+4
|
* Load any type (RSA/ECDSA) of public key via left|rightsigkeyTobias Brunner2013-05-079-13/+13
|
* left|rightrsasigkey accepts SSH keys but the key format has to be specified ↵Tobias Brunner2013-05-074-6/+6
| | | | | | | explicitly The default is now PKCS#1. With the dns: and ssh: prefixes other formats can be selected.
* Use attest database in tnc/tnccs-20-os scenario5.0.4Andreas Steffen2013-04-214-2/+15
|
* check for successful activation of FIPS modeAndreas Steffen2013-04-191-1/+4
|
* Added openssl-ikev2/rw-cpa scenarioAndreas Steffen2013-04-1929-0/+472
|
* disable reauth, tooAndreas Steffen2013-04-151-1/+2
|
* Added charon.initiator_only option which causes charon to ignore IKE ↵Andreas Steffen2013-04-1422-0/+264
| | | | initiation requests by peers
* cleaned up XML code in tnccs-11 pluginAndreas Steffen2013-04-044-10/+10
|
* Added Framed-IP-Address information to RADIUS accounting recordsAndreas Steffen2013-03-222-0/+2
|
* Added ikev2/rw-eap-framed-ip-radius scenarioAndreas Steffen2013-03-2219-0/+266
|
* Added ikev2/ip-two-pools-v4v6-db scenarioAndreas Steffen2013-03-229-0/+110
|
* Implement multiple-clients integration testReto Buerki2013-03-1912-0/+158
| | | | | | | | Two transport connections to gateway sun are set up, one from client carol and the other from client dave. The gateway sun uses the Trusted Key Manager (TKM) and is the responder for both connections. The authentication is based on X.509 certificates. In order to test the connections, both carol and dave ping gateway sun.
* Implement net2net-xfrmproxy integration testReto Buerki2013-03-1910-0/+108
|
* Implement net2net-initiator integration testReto Buerki2013-03-199-0/+104
|
* Add xfrm_proxy integration testReto Buerki2013-03-1910-0/+102
|
* Add TKM responder integration testReto Buerki2013-03-1910-0/+97
|
* Add initial TKM integration testReto Buerki2013-03-1910-0/+96
| | | | | | A connection between the hosts moon and sun is set up. The host moon uses the Trusted Key Manager (TKM) and is the initiator of the transport connection. The authentication is based on X.509 certificates.
* added openssl-ikev2/alg-aes-gcm scenarioAndreas Steffen2013-03-0311-0/+158
|
* use DNs in tnc/tnccs-20-tls scenarioAndreas Steffen2013-03-034-5/+3
|