Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | testing: Reissue attribute certificates for the new holder certificates | Martin Willi | 2014-10-03 | 8 | -72/+72 | |
| | | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests. | |||||
* | configure: Load fetcher plugins after crypto base plugins | Martin Willi | 2014-09-24 | 669 | -681/+676 | |
| | | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl. | |||||
* | testing: Use multiple jobs to install strongSwan | Tobias Brunner | 2014-09-19 | 1 | -1/+1 | |
| | ||||||
* | testing: Add a script to build the current (or an arbitrary) source tree | Tobias Brunner | 2014-09-19 | 1 | -0/+65 | |
| | | | | | | | | | | | | | | This allows to (relatively) quickly (re-)build and install the current or an arbitrary strongSwan source tree within the root image. bindfs is used to bind mount the source directory using the regular user and group (only works if sudo is used to run the script) so that newly created files are not owned by root. As with building the root image in general the guests must not be running while executing this script. The guest images are automatically rebuilt after the root image has been updated so configuration files and other modifications in guests will be lost. | |||||
* | testing: Add packages to rebuild strongSwan from the repository | Tobias Brunner | 2014-09-19 | 1 | -1/+2 | |
| | ||||||
* | testing: Make strongSwan build recipe more configurable | Tobias Brunner | 2014-09-19 | 1 | -4/+13 | |
| | ||||||
* | testing: Update certs and keys in tkm tests | Reto Buerki | 2014-09-17 | 6 | -0/+0 | |
| | | | | References #705. | |||||
* | testing: Update x509-ada version to 0.1.1 | Reto Buerki | 2014-09-17 | 1 | -1/+1 | |
| | | | | Fixes #705. | |||||
* | Generated new test certificates | Andreas Steffen | 2014-08-28 | 76 | -351/+542 | |
| | ||||||
* | testing: Make sure the kernel exists when starting | Tobias Brunner | 2014-08-25 | 1 | -0/+1 | |
| | ||||||
* | Updated URL to swidGenerator in recipe5.2.0 | Andreas Steffen | 2014-07-09 | 1 | -1/+1 | |
| | ||||||
* | Update KVM test framework to 3.15 guest kernel5.2.0rc1 | Andreas Steffen | 2014-06-27 | 2 | -3/+2086 | |
| | ||||||
* | testing: Add sql/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 18 | -0/+740 | |
| | ||||||
* | testing: Add pfkey/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 13 | -0/+175 | |
| | ||||||
* | testing: Remove obsolete shunt-policies scenarios | Tobias Brunner | 2014-06-26 | 24 | -688/+0 | |
| | ||||||
* | Updated description of TNC scenarios concerning RFC 7171 PT-EAP support | Andreas Steffen | 2014-06-26 | 6 | -24/+30 | |
| | ||||||
* | Removed django.db from swid scenarios | Andreas Steffen | 2014-06-26 | 2 | -0/+0 | |
| | ||||||
* | testing: Add ikev2/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-19 | 12 | -0/+171 | |
| | ||||||
* | testing: Remove ikev2/shunt-policies scenario | Tobias Brunner | 2014-06-19 | 10 | -166/+0 | |
| | | | | | This scenario doesn't really apply anymore (especially its use of drop policies). | |||||
* | Added swanctl/net2net-route scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+145 | |
| | ||||||
* | Added swanctl/net2net-start scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+140 | |
| | ||||||
* | Minor changes in swanctl scenarios | Andreas Steffen | 2014-06-18 | 7 | -5/+8 | |
| | ||||||
* | Added swanctl --list-pols and swanctl --stats do scenario log | Andreas Steffen | 2014-06-18 | 1 | -3/+12 | |
| | ||||||
* | testing: Delete accidentally committed test cases | Tobias Brunner | 2014-06-18 | 57 | -920/+0 | |
| | ||||||
* | Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenarios | Andreas Steffen | 2014-06-14 | 22 | -0/+441 | |
| | ||||||
* | Single-line --raw mode simplifies evaltest of swanctl scenarios | Andreas Steffen | 2014-06-14 | 5 | -92/+16 | |
| | ||||||
* | Added swanctl/ip-pool-db scenario | Andreas Steffen | 2014-06-11 | 11 | -0/+246 | |
| | ||||||
* | Updated strongTNC configuration | Andreas Steffen | 2014-06-11 | 8 | -12/+15 | |
| | ||||||
* | Added swanctl/ip-pool scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+231 | |
| | ||||||
* | Added swanctl/rw-cert scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+216 | |
| | ||||||
* | Define default swanctl credentials in hosts directory | Andreas Steffen | 2014-06-10 | 30 | -4/+383 | |
| | ||||||
* | testing: Cache packages downloaded with pip for strongTNC | Tobias Brunner | 2014-06-02 | 1 | -2/+7 | |
| | | | | This way no network connections is required to rebuild the root/guest images. | |||||
* | First swanctl scenario5.2.0dr5 | Andreas Steffen | 2014-06-01 | 17 | -14/+515 | |
| | ||||||
* | Test SWID REST API ins tnc/tnccs-20-pdp scenarios | Andreas Steffen | 2014-05-31 | 83 | -73/+1113 | |
| | ||||||
* | Migration from Debian 7.4 to 7.5 | Andreas Steffen | 2014-05-31 | 11 | -18/+18 | |
| | ||||||
* | Minor changes in the test environment5.2.0dr4 | Andreas Steffen | 2014-05-15 | 3 | -1/+11 | |
| | ||||||
* | Implemented PT-EAP protocol (RFC 7171) | Andreas Steffen | 2014-05-12 | 46 | -156/+163 | |
| | ||||||
* | testing: Added pfkey/compress test case | Tobias Brunner | 2014-04-24 | 9 | -0/+100 | |
| | ||||||
* | Handle tag separators | Andreas Steffen | 2014-04-15 | 1 | -1/+1 | |
| | ||||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 7 | -49/+75 | |
| | ||||||
* | Updated SWID scenarios | Andreas Steffen | 2014-04-15 | 6 | -4/+18 | |
| | ||||||
* | Implemented segmented SWID tag attributes on IMV side | Andreas Steffen | 2014-04-15 | 54 | -36/+101 | |
| | ||||||
* | Use python-based swidGenerator to generated SWID tags | Andreas Steffen | 2014-04-15 | 16 | -21/+46 | |
| | ||||||
* | Make Attestation IMV independent of OS IMV | Andreas Steffen | 2014-04-15 | 21 | -11/+310 | |
| | ||||||
* | Fixed pretest script in tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2014-04-04 | 1 | -1/+1 | |
| | ||||||
* | testing: Run 'conntrack -F' before all test scenarios | Tobias Brunner | 2014-04-02 | 28 | -41/+14 | |
| | | | | This prevents failures due to remaining conntrack entries. | |||||
* | Test TLS AEAD cipher suites | Andreas Steffen | 2014-04-01 | 10 | -10/+17 | |
| | ||||||
* | Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenario | Andreas Steffen | 2014-03-31 | 1 | -1/+1 | |
| | ||||||
* | revocation: Restrict OCSP signing to specific certificates | Martin Willi | 2014-03-31 | 2 | -3/+2 | |
| | | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally. | |||||
* | testing: Add an acert test that forces a fallback connection based on groups | Martin Willi | 2014-03-31 | 13 | -0/+199 | |
| |