aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests
Commit message (Collapse)AuthorAgeFilesLines
* testing: Fix firewall rule on alice in tnc/tnccs-20-pdp-pt-tls scenarioTobias Brunner2016-06-171-2/+2
|
* testing: Add expect-connection calls for all tests and hostsTobias Brunner2016-06-16184-11/+236
| | | | There are some exceptions (e.g. those that use auto=start or p2pnat).
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-16289-576/+576
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Fix posttest.dat for ikev2/rw-dnssec scenarioTobias Brunner2016-06-161-6/+6
|
* testing: Update Apache config for newer Debian releasesTobias Brunner2016-06-154-52/+64
| | | | | | It is still compatible with the current release as the config in sites-available will be ignored, while conf-enabled does not exist and is not included in the main config.
* testing: Fix scenarios that check /etc/resolv.confTobias Brunner2016-06-133-6/+6
|
* testing: Changed gcrypt-ikev1 scenarios to swanctlAndreas Steffen2016-05-1520-126/+148
|
* testing: wait until connections are loadedAndreas Steffen2016-05-1598-89/+178
|
* swanctl: Do not display rekey times for shuntsAndreas Steffen2016-05-051-0/+1
|
* testing: Use reauthentication and set CHILD_SA rekey time, bytes and packets ↵Andreas Steffen2016-05-042-0/+8
| | | | limits
* testing: uses xauth_id in swanctl/xauth-rsa scenarioAndreas Steffen2016-05-044-6/+8
|
* testing: Use absolute path of imv_policy_managerAndreas Steffen2016-04-268-8/+9
|
* testing: Added swanctl/rw-multi-ciphers-ikev1 scenarioAndreas Steffen2016-04-1211-0/+238
|
* testing: Added swanctl/manual_prio scenarioAndreas Steffen2016-04-0911-0/+277
|
* testing: Add swanctl/net2net-gw scenarioTobias Brunner2016-04-0911-0/+204
|
* testing: List conntrack table on sun in ikev2/host2host-transport-connmark ↵Tobias Brunner2016-04-061-0/+1
| | | | scenario
* testing: Updated updown scripts in libipsec scenarios to latest versionTobias Brunner2016-03-2311-0/+341
|
* Updated swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-105-28/+36
|
* testing: Add ikev2/reauth-mbb-revoked scenarioTobias Brunner2016-03-109-0/+105
|
* testing: Added swanctl/mult-auth-rsa-eap-sim-id scenarioAndreas Steffen2016-03-0620-0/+335
|
* testing: Added swanctl/xauth-rsa scenarioAndreas Steffen2016-03-0611-0/+211
|
* testing: attr-sql is a charon plugin5.4.0dr8Andreas Steffen2016-03-0511-42/+10
|
* testing: Added swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-0511-0/+271
|
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-0568-238/+221
|
* testing: Add ikev2/redirect-active scenarioTobias Brunner2016-03-0420-0/+322
|
* testing: Added swanctl/protoport-range scenarioAndreas Steffen2016-03-049-0/+159
|
* libhydra: Remove empty unused libraryTobias Brunner2016-03-0311-11/+11
|
* testing: Added swanctl/shunt-policies-nat-rwAndreas Steffen2016-02-2812-0/+231
|
* testing: Some minor fixes in test scenariosAndreas Steffen2016-02-282-0/+3
|
* testing: Added swanctl/protoport-dual scenarioAndreas Steffen2016-02-289-0/+142
|
* testing: converted af-alg scenarios to swanctlAndreas Steffen2016-02-2625-149/+198
|
* testing: Use absolute path to the _updown script in SQL scenariosTobias Brunner2016-02-1747-55/+55
| | | | | | /usr/local/sbin is not included in PATH set by the charon init script and since the ipsec script is obsolete when using swanctl it makes sense to change this anyway.
* testing: Increased ping interval in ikev2/trap-any scenarioAndreas Steffen2016-02-161-5/+5
|
* Corrected the description of the swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-161-1/+1
|
* Fix of the mutual TNC measurement use caseAndreas Steffen2016-02-1615-8/+214
| | | | | | | | | | | | | | | | | If the IKEv2 initiator acting as a TNC server receives invalid TNC measurements from the IKEv2 responder acting as a TNC clienti, the exchange of PB-TNC batches is continued until the IKEv2 responder acting as a TNC server has also finished its TNC measurements. In the past if these measurements in the other direction were correct the IKEv2 responder acting as EAP server declared the IKEv2 EAP authentication successful and the IPsec connection was established even though the TNC measurement verification on the EAP peer side failed. The fix adds an "allow" group membership on each endpoint if the corresponding TNC measurements of the peer are successful. By requiring a "allow" group membership in the IKEv2 connection definition the IPsec connection succeeds only if the TNC measurements on both sides are valid.
* testing: Added swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-0315-0/+279
|
* ikev1: Log successful authentication with signature schemeThomas Egerer2016-02-013-6/+6
| | | | | | Output is now identical to that of the IKEv2 pubkey authenticator. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
* testing: Don't attempt to start the daemon twice in ha/active-passive scenarioTobias Brunner2016-02-011-1/+0
|
* testing: Added swanctl/config-payload scenarioAndreas Steffen2016-01-1412-0/+219
|
* testing: Use include statement in swanctl/rw-pubkey-keyid scenarioAndreas Steffen2016-01-143-30/+19
|
* testing: swanctl/rw-pubkey-anon uses anonymous public keys in remote access ↵Andreas Steffen2016-01-0920-0/+297
| | | | scenario
* testing: added swanctl scenarios net2net-pubkey, rw-pubkey-keyid and rw-dnssecAndreas Steffen2016-01-0955-0/+824
|
* testing: Fixed description of swanctl/frags-iv4 scenarioAndreas Steffen2016-01-091-4/+4
|
* testing: Change sql scenarios to swanctlAndreas Steffen2016-01-03172-379/+422
|
* testing: Fix some IKEv1 scenarios after listing DH groups for CHILD_SAsTobias Brunner2015-12-214-8/+8
|
* testing: Fixed description in swanctl/rw-ntru-bliss scenarioAndreas Steffen2015-12-181-1/+1
|
* testing: Added swanctl/rw-ntru-bliss scenarioAndreas Steffen2015-12-1720-0/+214
|
* 128 bit default security strength requires 3072 bit prime DH groupAndreas Steffen2015-12-1430-64/+64
|
* testing: swanctl/rw-cert scenario tests password-protected RSA keyAndreas Steffen2015-12-122-0/+38
|
* Upgraded IKE and ESP proposals in swanctl scenarios to consistent 128 bit ↵Andreas Steffen2015-12-1246-237/+83
| | | | security