aboutsummaryrefslogtreecommitdiffstats
path: root/testing
Commit message (Collapse)AuthorAgeFilesLines
...
* Added swanctl/ip-pool scenarioAndreas Steffen2014-06-1011-0/+231
|
* Added swanctl/rw-cert scenarioAndreas Steffen2014-06-1011-0/+216
|
* Define default swanctl credentials in hosts directoryAndreas Steffen2014-06-1030-4/+383
|
* testing: Cache packages downloaded with pip for strongTNCTobias Brunner2014-06-021-2/+7
| | | | This way no network connections is required to rebuild the root/guest images.
* First swanctl scenario5.2.0dr5Andreas Steffen2014-06-0117-14/+515
|
* Test SWID REST API ins tnc/tnccs-20-pdp scenariosAndreas Steffen2014-05-3183-73/+1113
|
* Migration from Debian 7.4 to 7.5Andreas Steffen2014-05-3111-18/+18
|
* Minor changes in the test environment5.2.0dr4Andreas Steffen2014-05-153-1/+11
|
* Implemented PT-EAP protocol (RFC 7171)Andreas Steffen2014-05-1246-156/+163
|
* testing: Added pfkey/compress test caseTobias Brunner2014-04-249-0/+100
|
* Handle tag separatorsAndreas Steffen2014-04-151-1/+1
|
* Renewed expired user certificateAndreas Steffen2014-04-157-49/+75
|
* Updated SWID scenariosAndreas Steffen2014-04-156-4/+18
|
* Implemented segmented SWID tag attributes on IMV sideAndreas Steffen2014-04-1554-36/+101
|
* Use python-based swidGenerator to generated SWID tagsAndreas Steffen2014-04-1516-21/+46
|
* Make Attestation IMV independent of OS IMVAndreas Steffen2014-04-1521-11/+310
|
* Fixed pretest script in tnc/tnccs-20-pt-tls scenarioAndreas Steffen2014-04-041-1/+1
|
* testing: Run 'conntrack -F' before all test scenariosTobias Brunner2014-04-0228-41/+14
| | | | This prevents failures due to remaining conntrack entries.
* Test TLS AEAD cipher suitesAndreas Steffen2014-04-0110-10/+17
|
* Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenarioAndreas Steffen2014-03-311-1/+1
|
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-312-3/+2
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* testing: Add an acert test that forces a fallback connection based on groupsMartin Willi2014-03-3113-0/+199
|
* testing: Add an acert test case sending attribute certificates inlineMartin Willi2014-03-3118-0/+291
|
* testing: Add an acert test using locally cached attribute certificatesMartin Willi2014-03-3116-0/+239
|
* testing: build strongSwan with acert pluginMartin Willi2014-03-311-0/+1
|
* Added libipsec/net2net-3des scenarioAndreas Steffen2014-03-2811-0/+1521
|
* Renewed self-signed OCSP signer certificateAndreas Steffen2014-03-274-43/+45
|
* Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵Andreas Steffen2014-03-241-0/+4
| | | | scenario
* Updated expired certificates issued by the Research and Sales Intermediate CAsAndreas Steffen2014-03-2421-185/+295
|
* Renewed revoked Research CA certificate5.1.3dr1Andreas Steffen2014-03-226-11/+37
|
* Added openssl-ikev2/net2net-pgp-v3 scenarioAndreas Steffen2014-03-2217-0/+208
|
* Completed integration of ntru_crypto library into ntru pluginAndreas Steffen2014-03-229-0/+128
|
* Merged libstrongswan options into charon sectionAndreas Steffen2014-03-1598-240/+41
|
* strongswan.conf is not needed on RADIUS server aliceAndreas Steffen2014-03-152-0/+2
|
* Disable mandatory ECP support for attestionAndreas Steffen2014-03-0718-0/+312
|
* Added ikev2/lookip scenarioAndreas Steffen2014-02-1712-1/+151
|
* testing: Use installed PTS SQL schema and data instead of local copyTobias Brunner2014-02-126-1456/+8
|
* testing: Use installed SQL schema instead of local copyTobias Brunner2014-02-1225-334/+64
|
* Fixed description of ikev1/rw-ntru-psk scenarioAndreas Steffen2014-02-121-1/+1
|
* Updated test kvm tests to Linux 3.13 kernelAndreas Steffen2014-02-122-3/+2050
|
* Added ikev1/net2net-ntru-cert and ikev1/rw-ntru-psk scenariosAndreas Steffen2014-02-1223-0/+302
|
* testing: Add ssh script to distributionTobias Brunner2014-02-121-1/+1
|
* Added missing semicolon in SQL statementsAndreas Steffen2014-02-051-6/+6
|
* Added Android 4.3.1 to products database tableAndreas Steffen2014-02-041-2/+14
|
* Added new Android versions to PTS databaseAndreas Steffen2014-02-041-0/+60
|
* testing: Fetch the FreeRADIUS tarball from the "old" directoryMartin Willi2014-01-311-1/+1
| | | | Fixes #483.
* testing: Add ikev2/host2host-transport-nat scenarioTobias Brunner2014-01-239-0/+146
|
* testing: Add ipv6/rw-compress-ikev2 scenarioTobias Brunner2014-01-239-0/+125
|
* testing: Add ikev2/compress-nat scenarioTobias Brunner2014-01-2312-0/+187
|
* testing: Enable firewall for ikev2/compress scenarioTobias Brunner2014-01-238-7/+14
| | | | | Additionally, send a regular (small) ping as the kernel does not compress small packets and handles those differently inbound.